351

Configuring and Managing

Security ACLs

About Security Access Control Lists

351

Creating and Committing a Security ACL

353

Mapping Security ACLs

365

Modifying a Security ACL

369

Using ACLs to Change CoS

374

Enabling Prioritization for Legacy Voice over IP

376

Security ACL Configuration Scenario

377

About Security Access Control Lists

A security access control list (ACL) filters packets for the purpose of discarding them, permitting them, or permitting them with modification (marking) for class-of-service (CoS) priority treatment. A typical use of security ACLs is to enable users to send and receive packets within the local intranet, but restrict incoming packets to the server in which confidential salary information is stored.

Nortel provides a very powerful mapping application for security ACLs. In addition to being assigned to physical ports, VLANs, virtual ports in a VLAN, or Distributed APs, ACLs can be mapped dynamically to a user’s session, based on authorization information passed back from the AAA server during the user authentication process.

Nortel WLAN Security Switch 2300 Series Configuration Guide

Page 351
Image 351
Nortel Networks 2300 manual Configuring and Managing Security ACLs, About Security Access Control Lists