Netgear M5300-28G-POE+ (GSM7228PSv1h2) - 12-Port Managed Gigabit Switch Ratgeber Für Administratoren

Seite von 542
  Chapter 10.  ACLs
 
   
|
     
131
10
10.   
ACLs 
Access Control Lists
This chapter describes the Access Control Lists (ACLs) feature. The following examples are 
provided:
•     MAC ACLs 
•     ACL Mirroring 
•     ACL Redirect 
Access control lists (ACLs) can control the traffic entering a network. Normally ACLs reside in a 
firewall router or in a router connecting two internal networks. When you configure ACLs, you 
can selectively admit or reject inbound traffic, thereby controlling access to your network or to 
specific resources on your network. 
You can set up ACLs to control traffic at Layer 2-, or Layer 3. MAC ACLs are used for Layer 2. IP 
ACLs are used for Layer 3. Each ACL contains a set of rules that apply to inbound traffic. Each 
rule specifies whether the contents of a given field should be used to permit or deny access to 
the network, and may apply to one or more of the fields within a packet.
The following limitations apply to ACLs. These limitations are platform dependent.
•     
The maximum of number of ACLs is 100.
•     
The maximum number of rules per ACL is 8–10.
•     
Stacking systems do not support redirection.
•     
The system does not support MAC ACLs and IP ACLs on the same interface. 
•     
The system supports ACLs set up for inbound traffic only.