Netgear FS728TLP Web Management User Guide - Page 310

Access Control Lists, Traffic Filtering Concepts

Page 310 highlights

ProSAFE FS526Tv2, FS726Tv2, and FS728TLP Smart Switches Packets that enter these ports are tagged with the port VLAN ID. For more information about configuring PVIDs, see Configure Port VLAN IDs for Ports and LAGs on page 85. With the VLAN configuration that you have created, the following situations produce results as described: • If an untagged packet enters port 1, the switch tags it with VLAN ID 10. The packet has access to port 2 and port 3. The outgoing packet is stripped of its tag to leave port 2 as an untagged packet. For port 3, the outgoing packet leaves as a tagged packet with VLAN ID 10. • If a tagged packet with VLAN ID 10 enters port 3, the packet has access to port 1 and port 2. If the packet leaves port 1 or port 2, it is stripped of its tag to leave the switch as an untagged packet. • If an untagged packet enters port 4, the switch tags it with VLAN ID 20. The packet has access to port 5 and port 6. The outgoing packet is stripped of its tag to become an untagged packet as it leaves port 6. For port 5, the outgoing packet leaves as a tagged packet with VLAN ID 20. Access Control Lists Access control lists (ACLs) ensure that only authorized users have access to specific resources while blocking any unwarranted attempts to reach network resources. ACLs are used to provide traffic flow control, restrict contents of routing updates, determine which types of traffic are forwarded or blocked, and provide security for the network. ACLs are normally used in firewall routers that are positioned between the internal network and an external network, such as the Internet. ACLs can also be used on a router or switch positioned between two parts of the network to control the traffic entering or leaving a specific part of the internal network. The additional packet processing that ACLs require does not affect the performance of the smart switch. (ACL processing occurs at wire speed.) ACLs are a sequential collection of permit and deny conditions. This collection of conditions, known as the filtering criteria, is applied to each packet that the router or switch processes. The forwarding or dropping of a packet is based on whether the packet matches the specified criteria. Traffic Filtering Concepts Traffic filtering requires the following two basic steps: 1. Creating an ACL definition. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. Additionally, you can assign traffic that matches the criteria to a particular queue or redirect the traffic to a particular port. The configuration includes a default deny all IP traffic rule that is the last rule of the IP ACL table and a Configuration Examples 310

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335

Configuration Examples
310
ProSAFE FS526Tv2, FS726Tv2, and FS728TLP Smart Switches
Packets that enter these ports are tagged with the port VLAN ID.
For more information about configuring PVIDs, see
Configure Port VLAN IDs for Ports
and LAGs
on page
85.
With the VLAN configuration that you have created, the following situations produce results
as described:
If an untagged packet enters port 1, the switch tags it with VLAN ID 10. The packet has
access to port 2 and port 3. The outgoing packet is stripped of its tag to leave port
2 as an
untagged packet. For port 3, the outgoing packet leaves as a tagged packet with VLAN
ID
10.
If a tagged packet with VLAN ID 10 enters port 3, the packet has access to port 1 and
port
2. If the packet leaves port 1 or port 2, it is stripped of its tag to leave the switch as an
untagged packet.
If an untagged packet enters port 4, the switch tags it with VLAN ID 20. The packet has
access to port 5 and port 6. The outgoing packet is stripped of its tag to become an
untagged packet as it leaves port 6. For port 5, the outgoing packet leaves as a tagged
packet with VLAN ID 20.
Access Control Lists
Access control lists (ACLs) ensure that only authorized users have access to specific
resources while blocking any unwarranted attempts to reach network resources.
ACLs are used to provide traffic flow control, restrict contents of routing updates, determine
which types of traffic are forwarded or blocked, and provide security for the network. ACLs
are normally used in firewall routers that are positioned between the internal network and an
external network, such as the Internet. ACLs can also be used on a router or switch
positioned between two parts of the network to control the traffic entering or leaving a specific
part of the internal network. The additional packet processing that ACLs require does not
affect the performance of the smart switch. (ACL processing occurs at wire speed.)
ACLs are a sequential collection of permit and deny conditions. This collection of conditions,
known as the filtering criteria, is applied to each packet that the router or switch processes.
The forwarding or dropping of a packet is based on whether the packet matches the specified
criteria.
Traffic Filtering Concepts
Traffic filtering requires the following two basic steps:
1.
Creating an ACL definition.
The access list definition includes rules that specify whether traffic matching the criteria is
forwarded normally or discarded. Additionally, you can assign traffic that matches the
criteria to a particular queue or redirect the traffic to a particular port. The configuration
includes a default
deny all IP traffic
rule that is the last rule of the IP ACL table and a