Quick Reference Guide
GS108T and GS110TP Smart Switch Software Administration Manual
5-42 Managing Device Security
v1.0, April 2010
2. Click the box below each port to configure as a protected port. Protected ports are marked with
an X. No traffic forwarding is possible between two protected ports.
3. Click Refresh to refresh the page with the most current data from the switch.
4. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the
latest value of the switch.
5. If you make changes to the page, click Apply to apply the changes to the system.
Configuration changes take effect immediately.
Configuring Access Control Lists
Access Control Lists (ACLs) ensure that only authorized users have access to specific resources
while blocking off any unwarranted attempts to reach network resources. ACLs are used to
provide traffic flow control, restrict contents of routing updates, decide which types of traffic are
forwarded or blocked, and above all provide security for the network. GS108T and GS110TP
software supports IPv4 and MAC ACLs.
You first create an IPv4-based or MAC-based ACL ID. Then, you create a rule and assign it to a
unique ACL ID. Next, you define the rules, which can identify protocols, source, and destination
IP and MAC addresses, and other packet-matching criteria. Finally, use the ID number to assign
the ACL to a port or to a LAG.
The Security ACL folder contains links to the following features:
• “ACL Wizard” on page 5-43
• Basic:
• “MAC ACL” on page 5-44
• “MAC Rules” on page 5-46
• “MAC Binding Configuration” on page 5-48
• “MAC Binding Table” on page 5-49
• Advanced:
• “IP ACL” on page 5-50
• “IP Rules” on page 5-52
• “IP Extended Rule” on page 5-53
• “IP Binding Configuration” on page 5-58
• “IP Binding Table” on page 5-59