beautypg.com

Configuring and managing security acls, About security access control lists, Overview of security acl commands – 3Com WX4400 3CRWX440095A User Manual

Page 377: Onfiguring, Anaging, Ecurity

background image

19

C

ONFIGURING

AND

M

ANAGING

S

ECURITY

ACL

S

A security access control list (ACL) filters packets for the purpose of
discarding them, permitting them, or permitting them with modification
(marking) for class-of-service (CoS) priority treatment. A typical use of
security ACLs is to enable users to send and receive packets within the
local intranet, but restrict incoming packets to the server in which
confidential salary information is stored.

About Security
Access Control Lists

3Com provides a very powerful mapping application for security ACLs. In
addition to being assigned to physical ports, VLANs, virtual ports in a
VLAN, or Distributed MAPs, ACLs can be mapped dynamically to a user’s
session, based on authorization information passed back from the AAA
server during the user authentication process.

Overview of Security

ACL Commands

Figure 29 provides a visual overview of the way you use MSS commands
to set a security ACL, commit the ACL so it is stored in the configuration,
and map the ACL to a user session, VLAN, port, virtual port, or
Distributed MAP.