WESM zl Management and Configuration Guide WT.01.28 and greater

7-9
Access Control Lists (ACLs)
Configuring ACLs
As you configure ACLs, remember that they always have an implicit “deny any”
operation at the end; any traffic not specifically permitted by the rules within an ACL
will be denied.
Configuring ACLs
To configure an ACL, you must complete these steps:
1. Create the list and select the ACL type.
2. Create a series of ordered permit, deny, or mark rules.
3. Apply the list to an interface.
Do not complete the final step if you are using a standard IP ACL for a function other
than controlling traffic. These functions include:
NAT—The ACL selects traffic for dynamic source NAT; you specify the ACL
in the NAT configuration. See Chapter 8: “Configuring Network Address
Translation (NAT).”
secure Network Time Protocol (NTP)—The ACL selects which hosts are
allowed to send specific types of NTP communications. See “Applying ACLs
to NTP Services” on page 2-145 of Chapter 2: “Configuring the ProCurve
Wireless Edge Services zl Module.”
Creating ACLs
To create an ACL, complete these steps:
1. Select Security > ACLs > Configuration.