beautypg.com

Part 5: access and security – Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual

Page 11

background image

Software Reference for x310 Series Switches

C613-50046-01 REV A

AlliedWare Plus

TM

Operating System - Version 5.4.4C

xi

Part 5: Access and Security

Chapter 33:

Access Control Lists Introduction

Introduction.................................................................................................................................................................... 33.2

Overview................................................................................................................................................................... 33.2
ACL Rules .................................................................................................................................................................. 33.3
ACL Source and Destination Addresses ........................................................................................................ 33.3
ACL Reverse Masking ........................................................................................................................................... 33.3

Hardware and Software ACL Types........................................................................................................................ 33.4

Defining Hardware MAC ACLs .......................................................................................................................... 33.5
Defining Hardware IP ACLs ................................................................................................................................ 33.6
Actions for Hardware ACLs................................................................................................................................. 33.7
Attaching hardware ACLs to interfaces ......................................................................................................... 33.7

Hardware ACLs and QoS classifications................................................................................................................ 33.8

Classifying Your Traffic......................................................................................................................................... 33.8
Security ACLs........................................................................................................................................................... 33.8
QoS ACLs................................................................................................................................................................... 33.9
Attaching hardware ACLs using QoS ............................................................................................................. 33.9
Filtering hardware ACLs with QoS.................................................................................................................33.11
Using QoS Match Commands with TCP Flags...........................................................................................33.12

ACL Filter Sequence Numbers ...............................................................................................................................33.14

ACL Filter Sequence Number Behavior .......................................................................................................33.14
ACL Filter Sequence Number Applicability................................................................................................33.14
ACL Filter Sequence Number Types .............................................................................................................33.15

ACL Filter Sequence Configuration......................................................................................................................33.17

Creating ACLs in Global Configuration Mode ...........................................................................................33.19
Display the ACL configuration details..........................................................................................................33.21

Chapter 34:

IPv4 Hardware Access Control List (ACL) Commands

Introduction.................................................................................................................................................................... 34.2
IPv4 Hardware Access List Commands and Prompts ...................................................................................... 34.3
Command List................................................................................................................................................................ 34.4

Chapter 35:

IPv4 Software Access Control List (ACL) Commands

Introduction.................................................................................................................................................................... 35.2
IPv4 Software Access List Commands and Prompts........................................................................................ 35.3
Command List................................................................................................................................................................ 35.4

Chapter 36:

IPv6 Hardware Access Control List (ACL) Commands

Introduction.................................................................................................................................................................... 36.2
IPv6 Hardware Access List Commands and Prompts ...................................................................................... 36.3
Command List................................................................................................................................................................ 36.4

Chapter 37:

IPv6 Software Access Control List (ACL) Commands

Introduction.................................................................................................................................................................... 37.2
IPv6 Software Access List Commands and Prompts........................................................................................ 37.3
Command List................................................................................................................................................................ 37.4