User Guide
Managing Device Security
206
GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches
Configure Access Control Lists
Access control lists (ACLs) ensure that only authorized users have access to specific
resources while blocking off any unwarranted attempts to reach network resources. ACLs are
used to provide traffic flow control, restrict contents of routing updates, decide which types of
traffic are forwarded or blocked, and above all provide security for the network. Switch
software supports IPv4 and MAC ACLs.
To configure an ACL, first create an IPv4-based or MAC-based ACL ID. Then, create a rule
and assign it to a unique ACL ID. Next, define the rules, which can identify protocols, source,
and destination IP and MAC addresses, and other packet-matching criteria. Finally, use the
ID number to assign the ACL to a port or to a LAG.
To view ACL configuration examples, see Access Control Lists (ACLs) on page 266.
The ACL configuration menu contains links to the features described in the following sections.
• ACL Wizard
• Basic
• MAC ACL
• MAC Rules
• MAC Binding Configuration
• MAC Binding Table
• Advanced
• IP ACL
• IP Rules
• IP Extended Rules
• IPv6 ACL
• IPv6 Rules
• IP Binding Configuration
• IP Binding Table
• VLAN Binding Table










