Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
7-5
Access Control Lists (ACLs)
Overview
All ACLs include an implicit “deny any” rule at the end. In other words, if traffic
does not match any of the ACLs rules, the ACL drops the traffic. MAC standard
ACLs, which are configured as filters for local MAC authentication, are the
exception. They include an implicit “permit any” rule at the end. See “MAC
Filters (Local MAC Authentication)” on page 13-74 of Chapter 13: Wireless
Network Management.
Precedence
An ACLs rules are processed in ascending numeric order until a “match” is
found for the packet or frame. When the Wireless Edge Services xl Module
matches traffic to the rule, the rule has “selected” the traffic. The module then
performs the operation defined for the rule.
Each ACL has a list of ordered rules separate from all other ACLs. For
example, two ACLs can each have one rule with a precedence value of 1.
Filters
Filters specify the information that a packet’s header must match. As dis-
cussed in “ACL Types” on page 7-3, valid fields depend on the ACL type. A
packet or frame must match every filter that you specify.
Rules for all ACL types can include these filters:
source address, either IP or MAC address
The filter can select:
all addresses
a single address
a range of addresses, specified either by subnetwork address and
prefix length (for IP ACLs) or by mask (for MAC extended ACLs)
WLAN index number (from 1 through 32)
The traffic must arrive from this WLAN to match the rule. This setting is
optional and takes effect only for ACLs applied to physical interfaces. You
should only use it for the ACLs applied to the downlink port.
Extended IP ACL rules can include these additional filters:
destination IP address
The filter can select:
all addresses
a single address
a range of addresses, specified by subnetwork address and a
prefix length