beautypg.com

H3C Technologies H3C S3600 Series Switches User Manual

Page 705

background image

i

Table of Contents

1 ACL Configuration ········································································································ 1-1

ACL Overview ············································································································· 1-1

ACL Matching Order ····························································································· 1-2

Ways to Apply an ACL on a Switch ········································································ 1-3

Types of ACLs Supported by S3600 Series Ethernet Switches ······························· 1-3

ACL Configuration Task List ························································································ 1-4

Configuring Time Range ······················································································· 1-4

Configuring Basic ACL ·························································································· 1-6

Configuring Advanced ACL ··················································································· 1-7

Configuring Layer 2 ACL ······················································································· 1-8

Configuring User-defined ACL ············································································ 1-10

Configuring IPv6 ACL ························································································· 1-11

Applying ACL Rules on Ports ·············································································· 1-14

Applying ACL Rules to Ports in a VLAN ······························································· 1-15

Displaying and Maintaining ACL Configuration ··························································· 1-15

Examples for Upper-layer Software Referencing ACLs ··············································· 1-16

Example for Controlling Telnet Login Users by Source IP ···································· 1-16

Example for Controlling Web Login Users by Source IP ······································· 1-17

Examples for Applying ACLs to Hardware ·································································· 1-17

Basic ACL Configuration Example ······································································· 1-17

Advanced ACL Configuration Example ································································ 1-18

Layer 2 ACL Configuration Example ···································································· 1-19

User-defined ACL Configuration Example ···························································· 1-20

IPv6 ACL Configuration Example ········································································ 1-21

Example for Applying an ACL to a VLAN ····························································· 1-22

This manual is related to the following products: