WESM zl Management and Configuration Guide WT.01.XX and greater

7-30
Access Control Lists (ACLs)
Configuring ACLs
Table 7-6. Action IDs for ACL Statistics
Protocol—protocol for selected packets
Table 7-7 provides a key for the protocols.
Table 7-7. Protocol IDs for ACL Statistics
Low Source IP—the lowest source IP address specified for the rule
High Source IPthe highest source IP address specified for the rule
Low Destination IP—the lowest destination IP address specified for the rule
(always 0.0.0.0 for standard ACLs)
High Destination IP—the highest destination IP address specified for the
rule (always 0.0.0.0 for standard ACLs)
Times Used—the number of times that the Wireless Edge Services zl
Module has applied the ACL rule to traffic
The counter increments when the module drops a denied packet or when
permits the first packet in a session. The Wireless Edge Services zl Module
support stateful ACLs, which means that it automatically allows all traffic
in the session.
Check this column periodically to ensure that ACL rules are affecting
traffic. If not, you might need to reconfigure ACLs to make them more
relevant to your network. You can also check for a deny rule that filters
out traffic that should be allowed.
To view detailed statistics for a specific interface, select the interface and click
the Details button. The Details screen is displayed.
ID Protocol
2 drop—a deny rule
3 forward—a permit or mark rule
ID Protocol
-1 IP
1ICMP
6TCP
17 UDP