Netgear FS728TLP Web Management User Guide - Page 178
Access Control List Concepts, Use the ACL Wizard to Con ACLs
View all Netgear FS728TLP manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 178 highlights
ProSAFE FS526Tv2, FS726Tv2, and FS728TLP Smart Switches Access Control List Concepts Access control lists (ACLs) ensure that only authorized users have access to specific resources while blocking any unwarranted attempts to reach network resources. ACLs are used to provide security for the network, to provide traffic flow control, to restrict contents of routing updates, and to determine which types of traffic are forwarded or blocked. The smart switch supports ACLs based on the MAC addresses of the source and destination devices (MAC ACLs), ACLs based on the IPv4 addresses of the source and destination devices (basic IP ACLs), and ACLs that are based on the TCP or UDP source and destination ports (extended IP ACLs). ACLs are composed of access control entries (ACE), or rules, that consist of the filters that determine traffic classifications. These are the basic steps to configure an ACL: 1. Create a name or identifier for an ACL. 2. Create rules and assign them to the ACL. 3. Assign the ACL to an interface. Note: For more information about ACLs, including configuration examples, see Access Control Lists on page 310. Use the ACL Wizard to Configure ACLs The ACL Wizard lets you configure ACL permissions for devices based on the source and destination MAC addresses, source and destination IP addresses, and TCP or UDP source and destination port IDs. If you click the Permit or Deny link next to an ACL Wizard option, a new screen displays. Many of the fields and menus on the screen are preconfigured, based on your selection. You need to specify fields and make selections from menus for settings that are specific to your network and configuration. View the ACL Wizard Screen and View the Options This section provides general information about the ACL Wizard screen and the options that it provides. For detailed procedures, see the following sections: • Use the ACL Wizard to Create an ACL Based on MAC Addresses on page 180 • Use the ACL Wizard to Create an ACL Based on a Source IP Address on page 184 • Use the ACL Wizard to Create an ACL Based on a Destination IP Address on page 188 • Use the ACL Wizard to Create an ACL Based on TCP or UDP Ports on page 192 Manage Access Control Lists 178