Инструкции По Установке для 3com S7906E

Скачать
Страница из 2621
 
1-1 
1  
ACL Overview 
In order to filter traffic, network devices use sets of rules, called access control lists (ACLs), to identify 
and handle packets.  
When configuring ACLs, go to these chapters for information you are interested in: 
 
 
Unless otherwise stated, ACLs refer to both IPv4 ACLs and IPv6 ACLs throughout this document. 
The S7900E Series Ethernet Switches are distributed devices supporting Intelligent Resilient 
Framework (IRF). Two S7900E series can be connected together to form a distributed IRF device. 
If an S7900E series is not in any IRF, it operates as a distributed device; if the S7900E series is in 
an IRF, it operates as a distributed IRF device. For introduction of IRF, refer to IRF Configuration in 
the System Volume
 
Introduction to ACL 
Introduction 
As network scale and network traffic are increasingly growing, network security and bandwidth 
allocation become more and more critical to network management. Packet filtering can be used to 
efficiently prevent illegal users from accessing networks and to control network traffic and save network 
resources. Access control lists (ACL) are often used to filter packets with configured matching rules.  
ACLs are sets of rules (or sets of permit or deny statements) that decide what packets can pass and 
what should be rejected based on matching criteria such as source MAC address, destination MAC 
address, source IP address, destination IP address, and port number.  
Application of ACLs on the Switch 
The switch supports two ACL application modes: 
Hardware-based application: An ACL is assigned to a piece of hardware. For example, an ACL can 
be referenced by QoS for traffic classification. Note that when an ACL is referenced to implement 
QoS, the actions defined in the ACL rules, deny or permit, do not take effect; actions to be taken on 
packets matching the ACL depend on the traffic behavior definition in QoS. For details about traffic 
behavior, refer to the QoS part in this manual. 
Software-based application: An ACL is referenced by a piece of upper layer software. For example, 
an ACL can be referenced to configure login user control behavior, thus controlling Telnet, SNMP