Specifications
6-16 WS5100 Series Switch System Reference Guide
6.4.3 Associating an ACL with WLAN
Use the Membership screen to define a name for the ACL index and map the index to WLANs (1-32)
requiring membership permission restrictions.
To associate a filter ACL index with a WLAN:
1. Select Security> Wireless Filters from the main menu tree.
2. Select one or more of the existing ACLs from the filters list.
3. Click the Memberships button.
4. Check the box below each WLAN you want associated with the ACL.
Selecting a WLAN maps it the MAC address range and allow or deny designation assigned to it.
Consequently, be sure you are not restricting MU traffic for a WLAN that requires those MAC addresses
to interact with the switch.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click OK to use the changes to the running configuration and close the dialog.
7. Click Cancel to close the dialog without committing updates to the running configuration.
6.5 Configuring ACLs
An Access Control List (ACL) is a sequential collection of permit and deny conditions that apply to switch
data packets. When a packet is received on an interface, the switch compares the fields in the packet against
any applied ACLs to verify the packet has the required permissions to be forwarded, based on the criteria
specified in the access lists.
Use the ACL screen to view, add and configure Access Control configurations. Typically an ACL consists of
series of entries called an Access Control Entry (ACE). Each ACE defines the access rights for a user in
relationship to the switch. When access is attempted, the operating system uses the ACL to determine
whether the user has switch access permissions. It consists of the following tabs:
• Configuring an ACL
• Attaching an ACL
• Attaching an ACL on a WLAN Interface/Port
• Reviewing ACL Statistics
NOTE: If a packet does not meet any of the criteria specified in the ACL, then the packet
is dropped.
NOTE: For an overview of how the switch uses an ACL to filter permissions to the switch
managed network, proceed to ACL Overview on page 6-17.