Netgear FS728TLP Web Management User Guide - Page 178

Access Control List Concepts, Use the ACL Wizard to Con ACLs

Page 178 highlights

ProSAFE FS526Tv2, FS726Tv2, and FS728TLP Smart Switches Access Control List Concepts Access control lists (ACLs) ensure that only authorized users have access to specific resources while blocking any unwarranted attempts to reach network resources. ACLs are used to provide security for the network, to provide traffic flow control, to restrict contents of routing updates, and to determine which types of traffic are forwarded or blocked. The smart switch supports ACLs based on the MAC addresses of the source and destination devices (MAC ACLs), ACLs based on the IPv4 addresses of the source and destination devices (basic IP ACLs), and ACLs that are based on the TCP or UDP source and destination ports (extended IP ACLs). ACLs are composed of access control entries (ACE), or rules, that consist of the filters that determine traffic classifications. These are the basic steps to configure an ACL: 1. Create a name or identifier for an ACL. 2. Create rules and assign them to the ACL. 3. Assign the ACL to an interface. Note: For more information about ACLs, including configuration examples, see Access Control Lists on page 310. Use the ACL Wizard to Configure ACLs The ACL Wizard lets you configure ACL permissions for devices based on the source and destination MAC addresses, source and destination IP addresses, and TCP or UDP source and destination port IDs. If you click the Permit or Deny link next to an ACL Wizard option, a new screen displays. Many of the fields and menus on the screen are preconfigured, based on your selection. You need to specify fields and make selections from menus for settings that are specific to your network and configuration. View the ACL Wizard Screen and View the Options This section provides general information about the ACL Wizard screen and the options that it provides. For detailed procedures, see the following sections: • Use the ACL Wizard to Create an ACL Based on MAC Addresses on page 180 • Use the ACL Wizard to Create an ACL Based on a Source IP Address on page 184 • Use the ACL Wizard to Create an ACL Based on a Destination IP Address on page 188 • Use the ACL Wizard to Create an ACL Based on TCP or UDP Ports on page 192 Manage Access Control Lists 178

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335

Manage Access Control Lists
178
ProSAFE FS526Tv2, FS726Tv2, and FS728TLP Smart Switches
Access Control List Concepts
Access control lists (ACLs) ensure that only authorized users have access to specific
resources while blocking any unwarranted attempts to reach network resources. ACLs are
used to provide security for the network, to provide traffic flow control, to restrict contents of
routing updates, and to determine which types of traffic are forwarded or blocked.
The smart switch supports ACLs based on the MAC addresses of the source and destination
devices (MAC ACLs), ACLs based on the IPv4 addresses of the source and destination
devices (basic IP ACLs), and ACLs that are based on the TCP or UDP source and
destination ports (extended IP ACLs).
ACLs are composed of access control entries (ACE), or rules, that consist of the filters that
determine traffic classifications.
These are the basic steps to configure an ACL:
1.
Create a name or identifier for an ACL.
2.
Create rules and assign them to the ACL.
3.
Assign the ACL to an interface.
Note:
For more information about ACLs, including configuration examples,
see
Access Control Lists
on page
310.
Use the ACL Wizard to Configure ACLs
The ACL Wizard lets you configure ACL permissions for devices based on the source and
destination MAC addresses, source and destination IP addresses, and TCP or UDP source
and destination port IDs.
If you click the Permit or Deny link next to an ACL Wizard option, a new screen displays.
Many of the fields and menus on the screen are preconfigured, based on your selection. You
need to specify fields and make selections from menus for settings that are specific to your
network and configuration.
View the ACL Wizard Screen and View the Options
This section provides general information about the ACL Wizard screen and the options that
it provides. For detailed procedures, see the following sections:
Use the ACL Wizard to Create an ACL Based on MAC Addresses
on page
180
Use the ACL Wizard to Create an ACL Based on a Source IP Address
on page
184
Use the ACL Wizard to Create an ACL Based on a Destination IP Address
on page
188
Use the ACL Wizard to Create an ACL Based on TCP or UDP Ports
on page
192