Specifications
RoamAbout Mobility System Software Configuration Guide 15-1
15
Configuring and Managing Security ACLs
About Security Access Control Lists
Asecurityaccesscontrollist(ACL)filterspacketsforthepurposeofdiscardingthem,permitting
them,orpermittingthemwithmodification(marking)forclass‐of‐service(CoS)priority
treatment.AtypicaluseofsecurityACLsistoenableuserstosendandreceivepacketswithinthe
localintranet,butrestrictincoming
packetstotheserverinwhichconfidentialsalaryinformation
isstored.
Enterasys NetworksprovidesaverypowerfulmappingapplicationforsecurityACLs.VLANs,
virtualports inaVLAN,orDistributedAPs,ACLscanbemappeddynamicallytoauser’ssession,
basedonauthorizationinformationpassedbackfromtheAAAserverduring
theuser
authenticationprocess.
Overview of Security ACL Commands
Figure 15‐1onpage 15‐2providesavisualoverviewofthewayyouuseMSScommandstoseta
securityACL,committheACLsoitisstoredintheconfiguration,andmaptheACLtoauser
session,VLAN,virtualport,orDistributedAP.
For information about... Refer to page...
About Security Access Control Lists 15-1
Creating and Committing a Security ACL 15-4
Mapping Security ACLs 15-13
Modifying a Security ACL 15-16
Using ACLs to Change CoS 15-20
Enabling Prioritization for Legacy Voice over IP 15-23
Restricting Client-To-Client Forwarding Among IP-Only Clients 15-28
Security ACL Configuration Scenario 15-29