User manual
180 | Chapter 5: Managing Device Security
GS108T and GS110TP Smart Switch Software Administration Manual
Configuring Access Control Lists
Access Control Lists (ACLs) ensure that only authorized users have access to specific
resources while blocking off any unwarranted attempts to reach network resources. ACLs are
used to provide traffic flow control, restrict contents of routing updates, decide which types of
traffic are forwarded or blocked, and above all provide security for the network. switch
software supports IPv4 and MAC ACLs.
You first create an IPv4-based or MAC-based ACL ID. Then, you create a rule and assign it
to a unique ACL ID. Next, you define the rules, which can identify protocols, source, and
destination IP and MAC addresses, and other packet-matching criteria. Finally, use the ID
number to assign the ACL to a port or to a LAG.
The Security ACL folder contains links to the following features:
• ACL Wizard on page 180
• Basic:
• MAC ACL on page 182
• MAC Rules on page 183
• MAC Binding Configuration on page 184
• MAC Binding Table on page 186
• Advanced:
• IP ACL on page 187
• IP Rules on page 188
• IP Extended Rule on page 189
• IP Binding Configuration on page 193
• IP Binding Table on page 194
ACL Wizard
The ACL Wizard simplifies the ACL rule configuration process. The Wizard contains a short
list of access criteria that you can either permit or deny. When you select the permit or deny
link associated with the access criteria, you are redirected to a page that is automatically
configured with several of the settings.
Note: Before you use the ACL Wizard to configure rules, you must create
either a MAC ACL, Standard IP ACL, or Extended IP ACL that will
contain the rules. To create a MAC ACL, see
MAC ACL on
page 182. To create a standard or extended IP ACL, see IP ACL on
page 187.
To display the ACL Wizard page, click Security ACL.