10. ACLs

10

Access Control Lists

This chapter describes the Access Control Lists (ACLs) feature. The following examples are provided:

MAC ACLs on page 137

Set Up an IP ACL with Two Rules on page 138

One-Way Access Using a TCP Flag in an ACL on page 142

Use ACLs to Configure Isolated VLANs on a Layer 3 Switch on page 158

Set up a MAC ACL with Two Rules on page 169

ACL Mirroring on page 172

ACL Redirect on page 178

Configure IPv6 ACLs on page 183

Access control lists (ACLs) can control the traffic entering a network. Normally ACLs reside in a firewall router or in a router connecting two internal networks. When you configure ACLs, you can selectively admit or reject inbound traffic, thereby controlling access to your network or to specific resources on your network.

You can set up ACLs to control traffic at Layer 2-, or Layer 3. MAC ACLs are used for Layer 2. IP ACLs are used for Layer 3. Each ACL contains a set of rules that apply to inbound traffic. Each rule specifies whether the contents of a given field should be used to permit or deny access to the network, and may apply to one or more of the fields within a packet.

The following limitations apply to ACLs. These limitations are platform dependent.

The maximum of number of ACLs is 100.

The maximum number of rules per ACL is 8–10.

Stacking systems do not support redirection.

The system does not support MAC ACLs and IP ACLs on the same interface.

The system supports ACLs set up for inbound traffic only.

Chapter 10. ACLs 136

Page 136
Image 136
NETGEAR M7100, M4100 manual Access Control Lists