Part 5: access and security – Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual
Page 11
![background image](/manuals/427254/11/background.png)
Software Reference for x310 Series Switches
C613-50046-01 REV A
AlliedWare Plus
TM
Operating System - Version 5.4.4C
xi
Access Control Lists Introduction
Overview................................................................................................................................................................... 33.2
ACL Rules .................................................................................................................................................................. 33.3
ACL Source and Destination Addresses ........................................................................................................ 33.3
ACL Reverse Masking ........................................................................................................................................... 33.3
Defining Hardware MAC ACLs .......................................................................................................................... 33.5
Defining Hardware IP ACLs ................................................................................................................................ 33.6
Actions for Hardware ACLs................................................................................................................................. 33.7
Attaching hardware ACLs to interfaces ......................................................................................................... 33.7
Classifying Your Traffic......................................................................................................................................... 33.8
Security ACLs........................................................................................................................................................... 33.8
QoS ACLs................................................................................................................................................................... 33.9
Attaching hardware ACLs using QoS ............................................................................................................. 33.9
Filtering hardware ACLs with QoS.................................................................................................................33.11
Using QoS Match Commands with TCP Flags...........................................................................................33.12
ACL Filter Sequence Number Behavior .......................................................................................................33.14
ACL Filter Sequence Number Applicability................................................................................................33.14
ACL Filter Sequence Number Types .............................................................................................................33.15
Creating ACLs in Global Configuration Mode ...........................................................................................33.19
Display the ACL configuration details..........................................................................................................33.21
IPv4 Hardware Access Control List (ACL) Commands
Introduction.................................................................................................................................................................... 34.2
IPv4 Hardware Access List Commands and Prompts ...................................................................................... 34.3
Command List................................................................................................................................................................ 34.4
IPv4 Software Access Control List (ACL) Commands
Introduction.................................................................................................................................................................... 35.2
IPv4 Software Access List Commands and Prompts........................................................................................ 35.3
Command List................................................................................................................................................................ 35.4
IPv6 Hardware Access Control List (ACL) Commands
Introduction.................................................................................................................................................................... 36.2
IPv6 Hardware Access List Commands and Prompts ...................................................................................... 36.3
Command List................................................................................................................................................................ 36.4
IPv6 Software Access Control List (ACL) Commands
Introduction.................................................................................................................................................................... 37.2
IPv6 Software Access List Commands and Prompts........................................................................................ 37.3
Command List................................................................................................................................................................ 37.4