Figure10-14 Bind the policy to the VLAN

The following entries are displayed on this screen:

¾VLAN-Bind Config

Policy Name:

Select the name of the policy you want to bind.

VLAN ID:

Enter the ID of the VLAN you want to bind.

¾VLAN-Bind Table

Index:

Displays the index of the binding policy.

Policy Name:

Displays the name of the binding policy.

VLAN ID:

Displays the ID of the VLAN bound to the corresponding policy.

Direction:

Displays the binding direction.

Configuration Procedure:

Step

Operation

 

Description

 

 

 

 

1

Configure

effective

Required. On ACL→Time-Rangeconfiguration pages,

 

time-range

 

configure the effective time-ranges for ACLs.

 

 

 

 

2

Configure ACL rules

 

Required. On ACL→ACL Config configuration pages,

 

 

 

configure ACL rules to match packets.

 

 

 

 

3

Configure Policy

 

Required. On ACL→Policy Config configuration pages,

 

 

 

configure the policy to control the data packets those match

 

 

 

the corresponding ACL rules.

 

 

 

 

4

Bind the policy

to the

Required. On ACL→Policy Binding configuration pages,

 

port/VLAN

 

bind the policy to the port/VLAN to make the policy effective

 

 

 

on the corresponding port/VLAN.

 

 

 

 

10.5 Application Example for ACL

¾Network Requirements

1.The manager of the R&D department can access to the forum of the company and the Internet without any forbiddance. The MAC address of the manager is 00-46-A5-5D-12-C3.

2.The staff of the R&D department can not access to the Internet during the working time but can visit the forum all day.

3.The staff of the marketing department can access to the Internet all day but can not visit the forum during the working time.

133

Page 140
Image 140
TP-Link TL-SG3216 manual Application Example for ACL, ¾ VLAN-Bind Config, Enter the ID of the Vlan you want to bind