WESM zl Management and Configuration Guide WT.01.28 and greater
7-9
Access Control Lists (ACLs)
Configuring ACLs
As you configure ACLs, remember that they always have an implicit “deny any”
operation at the end; any traffic not specifically permitted by the rules within an ACL
will be denied.
Configuring ACLs
To configure an ACL, you must complete these steps:
1. Create the list and select the ACL type.
2. Create a series of ordered permit, deny, or mark rules.
3. Apply the list to an interface.
Do not complete the final step if you are using a standard IP ACL for a function other
than controlling traffic. These functions include:
■ NAT—The ACL selects traffic for dynamic source NAT; you specify the ACL
in the NAT configuration. See Chapter 8: “Configuring Network Address
Translation (NAT).”
■ secure Network Time Protocol (NTP)—The ACL selects which hosts are
allowed to send specific types of NTP communications. See “Applying ACLs
to NTP Services” on page 2-145 of Chapter 2: “Configuring the ProCurve
Wireless Edge Services zl Module.”
Creating ACLs
To create an ACL, complete these steps:
1. Select Security > ACLs > Configuration.