User manual

180 | Chapter 5: Managing Device Security
GS108T and GS110TP Smart Switch Software Administration Manual
Configuring Access Control Lists
Access Control Lists (ACLs) ensure that only authorized users have access to specific
resources while blocking off any unwarranted attempts to reach network resources. ACLs are
used to provide traffic flow control, restrict contents of routing updates, decide which types of
traffic are forwarded or blocked, and above all provide security for the network. switch
software supports IPv4 and MAC ACLs.
You first create an IPv4-based or MAC-based ACL ID. Then, you create a rule and assign it
to a unique ACL ID. Next, you define the rules, which can identify protocols, source, and
destination IP and MAC addresses, and other packet-matching criteria. Finally, use the ID
number to assign the ACL to a port or to a LAG.
The Security ACL folder contains links to the following features:
ACL Wizard on page 180
Basic:
MAC ACL on page 182
MAC Rules on page 183
MAC Binding Configuration on page 184
MAC Binding Table on page 186
Advanced:
IP ACL on page 187
IP Rules on page 188
IP Extended Rule on page 189
IP Binding Configuration on page 193
IP Binding Table on page 194
ACL Wizard
The ACL Wizard simplifies the ACL rule configuration process. The Wizard contains a short
list of access criteria that you can either permit or deny. When you select the permit or deny
link associated with the access criteria, you are redirected to a page that is automatically
configured with several of the settings.
Note: Before you use the ACL Wizard to configure rules, you must create
either a MAC ACL, Standard IP ACL, or Extended IP ACL that will
contain the rules. To create a MAC ACL, see
MAC ACL on
page 182. To create a standard or extended IP ACL, see IP ACL on
page 187.
To display the ACL Wizard page, click Security ACL.