User's Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.3 Port Management
- 4.4 Link Aggregation
- 4.5 VLAN
- 4.5.1 VLAN Overview
- 4.5.2 IEEE 802.1Q VLAN
- 4.5.3 Management VLAN
- 4.5.4 Create VLAN
- 4.5.5 Interface Settings
- 4.5.6 Port to VLAN
- 4.5.7 Port VLAN Membership
- 4.5.8 Protocol VLAN Group Setting
- 4.5.9 Protocol VLAN Port Setting
- 4.5.10 GVRP Setting
- 4.5.11 GVRP Port Setting
- 4.5.12 GVRP VLAN
- 4.5.13 GVRP Statistics
- 4.5.14 VLAN setting example:
- 4.6 Spanning Tree Protocol
- 4.7 Multicast
- 4.8 Quality of Service
- 4.9 Security
- 4.10 ACL
- 4.11 MAC Address Table
- 4.12 LLDP
- 4.13 Diagnostics
- 4.14 RMON
- 4.15 Power over Ethernet
- 4.16 Maintenance
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A
- EC Declaration of Conformity
User’s Manual of LRP-822CS/LRP-1622CS
277
4.10 ACL
CL is an acronym for Access Control List. It is the list table of ACEs, containing access control entries that specify individual
users or groups permitted or denied to specific traffic objects, such as a process or a program. Each accessible traffic object
contains an identifier to its ACL. The privileges determine whether there are specific traffic object access rights.
ACL implementations can be quite complex, for example, when the ACEs are prioritized for the various situation. In networking,
the ACL refers to a list of service ports or network services that are available on a host or server, each with a list of hosts or
servers permitted or denied to use the service. ACL can generally be configured to control inbound traffic, and in this context,
they are similar to firewalls.
ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID.
There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also
contains many detailed, different parameter options that are available for individual application.
The ACL page contains links to th
MAC-based ACL
Configure MAC-based ACL setting
Add / Edit / Delete the MAC-based ACE (Access Control Entry) setting
IPv4-based ACL
Configure IPv4-based ACL setting
IPv4-based ACE
Add / Edit / Delete the IPv4-based ACE (Access Control Entry) setting
-based ACL
Configure IPv6-based ACL setting
d ACE
6-based ACE (Access Control Entry) setting
h switch port.
T status by different ACL users. Each row describes the ACE that is defined. It is a conflict if a specific
o the hardware due to ha d ACL screens in Figure 4-10-1 & Figure 4-10-2
ppear.
A
e follow
ing main topics:
MAC-based ACE
IPv6
IPv6-base
Add / Edit / Delete the IPv
ACL Binding
Configure the ACL parameters (ACE) of eac
4.10.1 MAC-based ACL
his page shows the ACL
ACE is not applied t rdware limitations. MAC-base
a
Figure 4-10-1 MAC-based ACL Page Screenshot
The page includes the following fields:
Object Description
ACL Name
Create a name from MAC-based ACL list