ProCurve 6200yl User's Guide Page 318

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 317
10-32
Access Control Lists (ACLs)
Planning an ACL Application
Security
ACLs can enhance security by blocking IP traffic carrying an unauthorized
source IP address (SA). This can include:
blocking access from specific devices or interfaces (port or VLAN)
blocking access to or from subnets in your network
blocking access to or from the internet
blocking access to sensitive data storage or restricted equipment
preventing specific IP, TCP, UDP, IGMP, and ICMP traffic types,
including unauthorized access using functions such as Telnet, SSH,
and web browser
You can also enhance switch management security by using ACLs to block IP
traffic that has the switch itself as the destination address (DA).
Caution ACLs can enhance network security by blocking selected IP traffic, and can
serve as one aspect of maintaining network security. However, because ACLs
do not provide user or device authentication, or protection from malicious
manipulation of data carried in IP packet transmissions, they should not
be relied upon for a complete security solution.
Note ACLs in the switches covered by this guide do not filter non-IP traffic such as
AppleTalk and IPX.
Guidelines for Planning the Structure of an ACL
After determining the filtering type (standard or extended) and ACL applica-
tion (RACL, VACL, or static port ACL) to use at a particular point in your
network, determine the order in which to apply individual ACEs to filter IP
traffic (For information on ACL applications, refer to “ACL Applications” on
page 10-15.) .
The sequence of ACEs is significant. When the switch uses an ACL to
determine whether to permit or deny a packet on a particular VLAN,
it compares the packet to the criteria specified in the individual
Page view 317
1 2 ... 313 314 315 316 317 318 319 320 321 322 323 ... 595 596

Comments to this Manuals

No comments