TP-Link TL-SG5426 User Guide - Page 110
Access Control Lists, Configuring Access Control Lists
UPC - 845973020729
View all TP-Link TL-SG5426 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 110 highlights
3 Access Control Lists CLI - This example displays the 802.1X statistics for port 4. Console#show dot1x statistics interface ethernet 1/4 4-86 Eth 1/4 Rx: EAPOL Start 2 EAPOL Logoff 0 EAPOL Invalid 0 EAPOL Total 1007 EAP EAP EAP Resp/Id Resp/Oth LenError 672 0 0 Last EAPOLVer 1 Last EAPOLSrc 00-12-CF-94-34-DE Tx: EAPOL Total 2017 Console# EAP Req/Id 1005 EAP Req/Oth 0 Access Control Lists Access Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protocol port number or TCP control code) or any frames (based on MAC address or Ethernet type). To filter incoming packets, first create an access list, add the required rules, and then bind the list to a specific port. Configuring Access Control Lists An ACL is a sequential list of permit or deny conditions that apply to IP addresses, MAC addresses, or other more specific criteria. This switch tests ingress or egress packets against the conditions in an ACL one by one. A packet will be accepted as soon as it matches a permit rule, or dropped as soon as it matches a deny rule. If no rules match for a list of all permit rules, the packet is dropped; and if no rules match for a list of all deny rules, the packet is accepted. Command Usage The following restrictions apply to ACLs: • Each ACL can have up to 32 rules. • The maximum number of ACLs is also 32. • The maximum number of rules that can be bound to the ports is 96 for each of the following list types: MAC ACLs, IP ACLs (including Standard and Extended ACLs). • When an ACL is bound to an interface as an egress filter, all entries in the ACL must be deny rules. Otherwise, the bind operation will fail. • The switch does not support the explicit "deny any any" rule for the egress IP ACL. If these rules are included in ACL, and you attempt to bind the ACL to an interface for egress checking, the bind operation will fail. The order in which active ACLs are checked is as follows: 1. User-defined rules in the Egress IP ACL for egress ports. 2. User-defined rules in the Ingress IP ACL for ingress ports. 3-67