System information

224 | Chapter 7: Managing Device Security
GS752TXS Smart Switch Software Administration Manual
To configure protected ports:
1. Click the orange bar to display the available ports.
2. Click the box below each port to configure as a protected port. Protected ports are marked
with a
. No traffic forwarding is possible between two protected ports.
3. Click Refresh to refresh the page with the most current data from the switch.
4. Click Cancel to cancel the configuration on the screen and reset the data on the screen to
the latest value of the switch.
5. If you make changes to the page, click Apply to apply the changes to the system.
Configuration changes take effect immediately.
Configuring Access Control Lists
Access Control Lists (ACLs) ensure that only authorized users have access to specific
resources while blocking off any unwarranted attempts to reach network resources. ACLs are
used to provide traffic flow control, restrict contents of routing updates, decide which types of
traffic are forwarded or blocked, and above all provide security for the network. GS752TXS
Smart Switch software supports IPv4 and MAC ACLs.
To configure an ACL, first create an IPv4-based or MAC-based ACL ID. Then, create a rule
and assign it to a unique ACL ID. Next, define the rules, which can identify protocols, source,
and destination IP and MAC addresses, and other packet-matching criteria. Finally, use the
ID number to assign the ACL to a port or to a LAG.
The Security
ACL folder contains links to the following features:
ACL Wizard on page 225
Basic
MAC ACL on page 227
MAC Rules on page 228