ACCESS CONTROL LISTS

When an ACL is bound to an interface as an egress filter, all entries in the ACL must be deny rules. Otherwise, the bind operation will fail.

The switch does not support the explicit “deny any any” rule for the egress IP ACL or the egress MAC ACLs. If these rules are included in ACL, and you attempt to bind the ACL to an interface for egress checking, the bind operation will fail.

The order in which active ACLs are checked is as follows:

1.User-defined rules in the Egress MAC ACL for egress ports.

2.User-defined rules in the Egress IP ACL for egress ports.

3.User-defined rules in the Ingress MAC ACL for ingress ports.

4.User-defined rules in the Ingress IP ACL for ingress ports.

5.Explicit default rule (permit any any) in the ingress IP ACL for ingress ports.

6.Explicit default rule (permit any any) in the ingress MAC ACL for ingress ports.

7.If no explicit rule is matched, the implicit default is permit all.

Setting the ACL Name and Type

Use the ACL Configuration page to designate the name and type of an ACL.

Command Attributes

Name – Name of the ACL. (Maximum length: 15 characters)

Type – There are three filtering modes:

-Standard: IP ACL mode that filters packets based on the source IP address.

-Extended: IP ACL mode that filters packets based on source or destination IP address, as well as protocol type and protocol port number. If the “TCP” protocol is specified, then you can also filter packets based on the TCP control code.

-MAC: MAC ACL mode that filters packets based on the source or destination MAC address and the Ethernet frame type (RFC 1060).

3-99

Page 155
Image 155
SMC Networks SMC6824M manual Setting the ACL Name and Type, Command Attributes

SMC6824M specifications

The SMC Networks SMC6824M is a robust and reliable managed switch that caters to the needs of small to mid-sized businesses, as well as enterprise environments. This switch is designed to provide enhanced performance, scalability, and security for network infrastructures that require efficient traffic management and comprehensive control.

One of the key features of the SMC6824M is its 24 10/100/1000BASE-T ports, which offer lightning-fast Ethernet connectivity. These ports are capable of auto-negotiation, allowing devices to automatically adjust their settings for optimal performance, making it easier to integrate various hardware into existing networks. Additionally, the switch includes four Gigabit SFP slots for fiber uplinks, which allow for extended connectivity options and improved network design.

The SMC6824M employs advanced Layer 2 and Layer 3 functionalities, giving network administrators the tools they need to manage their networks effectively. It supports features like VLAN (Virtual Local Area Network) support and Quality of Service (QoS), ensuring efficient bandwidth management and enhanced performance for critical applications. Through VLAN segmentation, it can isolate network traffic for different departments or functions, enhancing security and reducing congestion.

The switch also offers comprehensive network management capabilities through SNMP (Simple Network Management Protocol) and a web-based interface, enabling easy configuration, monitoring, and troubleshooting. The SMC6824M includes support for port mirroring, which is important for diagnostics and monitoring network performance.

Another significant characteristic of the SMC6824M is its redundancy features, which include IEEE 802.1d Spanning Tree Protocol (STP) to prevent loops and provide network resilience. This is essential for maintaining continuous operation, especially in dynamic environments where network availability is critical.

In terms of security, the SMC6824M supports 802.1X port-based authentication, ensuring that only authorized devices gain access to the network. This feature is crucial for protecting sensitive data and maintaining the integrity of the network.

Overall, the SMC Networks SMC6824M is a versatile and feature-rich managed switch that delivers the performance and flexibility required to support growing networks. Its combination of layer management, security features, and user-friendly interface makes it an excellent choice for organizations looking to enhance their network infrastructure.