Access Security Guide K/KA/KB.15.15

However, using a device at 10.10.30.11 on VLAN 50 for attempts to ping and Telnet to
10.10.20.12 requires routing, and filters the attempts through the RACL instance of the "Test-1"
ACL on VLAN 50.
Figure 221 Ping and telnet from 10.10.30.11 to 10.10.20.2 filtered by the assignment of "Test-1"
as a RACL on VLAN 30
This action has an identical effect on the counters in all RACL instances of the "Test-1" ACL
configured and assigned to interfaces on the same switch. In this example, it means that the RACL
assignments of "Test-1" on VLANs 50 and 70 will be incremented by the above action occurring
on VLAN 50.
Figure 222 Resulting ACE hits on the VLAN 30 RACL assignment of the "Test-1" ACL
Figure 223 Resulting ACE hits on the VLAN 70 RACL assignment of the "Test-1" ACL
Note that the ACE counters for the VACL assignment of the "Test-1" ACL on VLAN 20 are not
affected by ACE hits on the RACL assignments of the same ACL.
Overview
Introduction
An Access Control List (ACL) is a list of one or more Access Control Entries (ACEs), where each
ACE consists of a matching criteria and an action (permit or deny). The information below describes
how to configure, apply, and edit static IPv4 ACLs in a network populated with HP switches, and
how to monitor IPv4 ACL actions.
Overview 301