Netgear GSM7248v1 GSM7224 Administration manual - Page 73

Access Control Lists (ACLs), Overview, Limitations, MAC ACLs

Page 73 highlights

Chapter 9 Access Control Lists (ACLs) This section describes the Access Control Lists (ACLs) feature. Overview Access Control Lists (ACLs) can control the traffic entering a network. Normally ACLs reside in a firewall router or in a router connecting two internal networks. When you configure ACLs, you can selectively admit or reject inbound traffic, thereby controlling access to your network or to specific resources on your network. You can set up ACLs to control traffic at Layer 2, or Layer3. MAC ACLs are used for Layer 2. IP ACLs are used for Layers 3. Each ACL contains a set of rules that apply to inbound traffic. Each rule specifies whether the contents of a given field should be used to permit or deny access to the network, and may apply to one or more of the fields within a packet. Limitations The following limitations apply to ACLs. These limitations are platform dependent. • Maximum of 100 ACLs • Maximum rules per ACL is 8-10 • Stacking systems do not support redirection The system does not support MAC ACLs and IP ACLs on the same interface. The system supports ACLs set up for inbound traffic only. MAC ACLs MAC ACLs are Layer 2 ACLs. You can configure the rules to inspect the following fields of a packet (limited by platform): • Source MAC address with mask 9-1 v1.0, Jan 2007

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148

9-1
v1.0, Jan 2007
Chapter 9
Access Control Lists (ACLs)
This section describes the Access Control Lists (ACLs) feature.
Overview
Access Control Lists (ACLs) can control the traffic entering a network. Normally ACLs reside in a
firewall router or in a router connecting two internal networks. When you configure ACLs, you
can selectively admit or reject inbound traffic, thereby controlling access to your network or to
specific resources on your network.
You can set up ACLs to control traffic at Layer 2, or Layer3. MAC ACLs are used for Layer 2. IP
ACLs are used for Layers 3.
Each ACL contains a set of rules that apply to inbound traffic. Each rule specifies whether the
contents of a given field should be used to permit or deny access to the network, and may apply to
one or more of the fields within a packet.
Limitations
The following limitations apply to ACLs. These limitations are platform dependent.
Maximum of 100 ACLs
Maximum rules per ACL is 8-10
Stacking systems do not support redirection
The system does not support MAC ACLs and IP ACLs on the same interface.
The system supports ACLs set up for inbound traffic only.
MAC ACLs
MAC ACLs are Layer 2 ACLs. You can configure the rules to inspect the following fields of a
packet (limited by platform):
Source MAC address with mask