Specifications
About Security Access Control Lists
15-2 Configuring and Managing Security ACLs
Figure 15-1 Setting Security ACLs
Security ACL Filters
AsecurityACLfilterspacketstorestrictorpermitnetworktraffic.Thesefilterscanthenbe
mappedbynametoauthenticatedusers,VLANs,virtualports,orDistributedAPs.Youcanalso
assignaclass‐of‐service(CoS)levelthatmarksthepacketsmatchingthefilterforpriority
handling.
AsecurityACL
containsanorderedlistofrulescalledaccesscontrolentries(ACEs),whichspecify
howtohandlepackets.AnACEcontainsanactionthatcandenythetraffic,permitthetraffic,or
permitthetrafficandapplytoitaspecificCoSlevelofpackethandling.Thefiltercaninclude
source
anddestinationIPaddressinformationalongwithotherLayer 3andLayer 4parameters.
Actionistakenonlyifthepacketmatchesthefilter.
TheorderinwhichACEsarelistedinanACLisimportant.MSSappliesACEsthatarehigherin
thelistbeforeACEslowerinthelist.(See“Modifying
aSecurityACL”onpage 15‐16.)Animplicit
“denyall”ruleisalwaysprocessedasthelastACEofanACL.IfapacketmatchesnoACEinthe
entiremappedACL,thepacketisrejected.IftheACLdoesnotcontainatleastoneACEtha t
permitsaccess,no
trafficisallowed.
PlanyoursecurityACLmapstoVLANs,virtualports,andDistributedAPssothatonlyone
securityACLfiltersagivenflowofpackets.IfmorethanonesecurityACLfiltersthesametraffic,
MSSappliesonlythefirstACLmatchandignoresanyothermatches.Security
ACLsthatare
mappedtousershaveprecedenceoverACLsmappedtoVLANs,virtualports,orDistributed
APs.
ACLs in
edit buffer
null
Commited ACLs
null
ACLs mapped to ports,
VLANs, and virtual ports
ACLs mapped
to users