Dell PowerConnect 5448 User's Guide - Page 256
ACL Overview, show ports security
View all Dell PowerConnect 5448 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 256 highlights
The following is an example of the CLI commands: Console # show ports security Port Status g7 Unlocked g8 Unlocked g3 Unlocked Action ------Discard Discard, Shutdown - Trap ------Enable Disable - Frequency --------100 Counter -------88 - - ACL Overview Access Control Lists (ACL) allow network managers to define classification actions and rules for specific ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or denied entry and the ingress port is disabled. If they are denied entry, the user can disable the port. Defining IP based ACLs Access Control Lists (ACL), which are comprised of Access Control Entries (ACE), allow network managers to define classification actions and rules for specific ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or denied entry and the ingress port is disabled. If they are denied entry, the user can disable the port. For example, a network administrator defines an ACL rule that states, port number 20 can receive TCP packets, however, if a UDP packet is received, the packet is dropped. ACLs are composed of access control entries (ACEs) that are made of the filters that determine traffic classifications. Each ACE is a rule, and there are 1,024 rules available. But rules are not only used for user configuration purposes, they are also used for features like iSCSI and PVE, so not all 1,024 will be available for ACEs. It is expected that you will have at least 600 rules available. To define IP based ACLs, click Switch→ Network Security→ IP Based ACL. I 256 Configuring Device Information