Netgear GSM7252PS ProSafe Managed Switch Web Management User Manual - Page 524
Configuring Access Control Lists, Basic, MAC ACL
UPC - 606449071665
View all Netgear GSM7252PS manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 524 highlights
ProSafe® Gigabit L3 Managed Stackable Switches Software Administration Manual Configuring Access Control Lists Access Control Lists (ACLs) ensure that only authorized users have access to specific resources while blocking off any unwarranted attempts to reach network resources. ACLs are used to provide traffic flow control, restrict contents of routing updates, decide which types of traffic are forwarded or blocked, and above all provide security for the network. ProSafe® Managed Switches software supports IPv4 and MAC ACLs. You first create an IPv4-based or MAC-based ACL ID. Then, you create a rule and assign it to a unique ACL ID. Next, you define the rules, which can identify protocols, source, and destination IP and MAC addresses, and other packet-matching criteria. Finally, use the ID number to assign the ACL to a port or to a LAG. The Security ACL folder contains links to the following features: Basic The Basic folder contains links to the following features: • MAC ACL on page 524 • MAC Rules on page 526 • MAC Binding Configuration on page 528 • MAC Binding Table on page 530 MAC ACL A MAC ACL consists of a set of rules which are matched sequentially against a packet. When a packet meets the match criteria of a rule, the specified rule action (Permit/Deny) is taken and the additional rules are not checked for a match. On this menu the interfaces to which an MAC ACL applies must be specified, as well as whether it applies to inbound or outbound traffic. Rules for the MAC ACL are specified/created using the MAC ACL Rule Configuration menu. There are multiple steps involved in defining a MAC ACL and applying it to the switch: 1. Use the MAC ACL page to create the ACL ID. 2. Use the MAC Rules page to create rules for the ACL. 3. Use the MAC Binding Configuration page to assign the ACL by its ID number to a port. 4. Optionally, use the MAC Binding Table page to view the configurations. 524 | Chapter 6. Managing Device Security