Users Guide

Table Of Contents
280 | Roles and Policies Dell PowerConnect ArubaOS 5.0 | [User Guide
Access Control Lists (ACLs)
Access control lists (ACLs) are a common way of restricting certain types of traffic on a physical port. ArubaOS
provides the following types of ACLs:
z Standard ACLs permit or deny traffic based on the source IP address of the packet. Standard ACLS can be
either named or numbered, with valid numbers in the range of 1-99 and 1300-1399. Standard ACLs use a
bitwise mask to specify the portion of the source IP address to be matched.
z Extended ACLs permit or deny traffic based on source or destination IP address, source or destination port
number, or IP protocol. Extended ACLs can be named or numbered, with valid numbers in the range 100-199
and 2000-2699.
z MAC ACLs are used to filter traffic on a specific source MAC address or range of MAC addresses. Optionally,
you can mirror packets to a datapath or remote destination for troubleshooting and debugging purposes. MAC
ACLs can be either named or numbered, with valid numbers in the range of 700-799 and 1200-1299.
z Ethertype ACLs are used to filter based on the Ethertype field in the frame header. Optionally, you can mirror
packets to a datapath or remote destination for troubleshooting and debugging purposes. Ethertype ACLs can
be either named or numbered, with valid numbers in the range of 200-299.These ACLs can be used to permit
IP while blocking other non-IP protocols, such as IPX or AppleTalk.
ArubaOS provides both standard and extended ACLs for compatibility with router software from popular
vendors, however firewall policies provide equivalent and greater function than standard and extended ACLs and
should be used instead.
You can apply MAC and Ethertype ACLs to a user role, however these ACLs only apply to non-IP traffic from the
user.
Creating a Firewall Policy
This section describes how to configure the rules that constitute a firewall policy. A firewall policy can then be
applied to a user role (until the policy is applied to a user role, it does not have any effect).
Table 55 describes required and optional parameters for a rule.
Table 55 Firewall Policy Rule Parameters
Field Description
Source (required) Source of the traffic, which can be one of the following:
z any: Acts as a wildcard and applies to any source address.
z user: This refers to traffic from the wireless client.
z host: This refers to traffic from a specific host. When this option is chosen, you must configure the
IP address of the host.
z network: This refers to a traffic that has a source IP from a subnet of IP addresses. When this
option is chosen, you must configure the IP address and network mask of the subnet.
z alias: This refers to using an alias for a host or network. You configure the alias by navigating to the
Configuration > Advanced Services > Stateful Firewall > Destination page.
Destination
(required)
Destination of the traffic, which can be configured in the same manner as Source.