An Access Control List (ACL) is a list of network traffic filters and correlated actions used to improve security. It blocks or allows users to access specific resources. An ACL contains the hosts that are permitted or denied access to the network device.
The IPv4-based ACL is a list of source IPv4 addresses that use Layer 3 information to permit or deny access to traffic. IPv4 ACLs restrict IP-related traffic based on the configured IP filters. A filter contains the rules to match an IP packet, and if the packet matches, the rule also stipulates if the packet should be permitted or denied.
An Access Control Entry (ACE) contains the actual access rule criteria. Once the ACE is created, it is applied to an ACL.
You should use access lists to provide a basic level of security for accessing your network. If you do not configure access lists on your network devices, all packets passing through the switch or router could be allowed onto all parts of your network.
This article provides instructions on how to configure IPv4-based ACL and ACE on your managed switch.
Step 1. Log in to the web-based utility then go to Access Control > IPv4-Based ACL.
Step 2. Click the Add button.
Step 3. Enter the name of the new ACL in the ACL Name field.
Note: In this example, IPv4 ACL is used.
Step 4. Click Apply then click Close.
Step 5. (Optional) Click Save to save settings in the startup configuration file.
You should now have configured an IPv4-based ACL on your switch.
When a packet is received on a port, the switch processes the packet through the first ACL. If the packet matches an ACE filter of the first ACL, the ACE action takes place. If the packet matches none of the ACE filters, the next ACL is processed. If no match is found to any ACE in all relevant ACLs, the packet is dropped by default.
In this scenario, an ACE will be created to deny traffic that is sent from a specific user-defined source IPv4 address to any destination addresses.
Note: This default action can be avoided by the creation of a low priority ACE that permits all traffic.
Step 1. On the web-based utility, go to Access Control > IPv4-Based ACE.
Important: To fully utilize the available features and functions of the switch, change to Advanced mode by choosing Advanced from the Display Mode drop-down list in the upper-right corner of the page.
Step 2. Choose an ACL from the ACL Name drop-down list then click Go.
Note: The ACEs that are already configured for the ACL will be displayed in the table.
Step 3. Click the Add button to add a new rule to the ACL.
Note: The ACL Name field displays the name of the ACL.
Step 4. Enter the priority value for the ACE in the Priority field. ACEs with a higher priority value are processed first. The value 1 is the highest priority. It has a range of 1 to 2147483647.
Note: In this example, 2 is used.
Step 5. Click the radio button that corresponds to the desired action that is taken when a frame meets the required criteria of the ACE.
Note: In this example, Permit is chosen.
Note: Disabled ports can be reactivated on the Port Settings page.
Step 6. (Optional) Check the Enable Logging check box to enable logging of ACL flows that match the ACL rule.
Step 7. (Optional) Check the Enable Time Range check box to allow a time range to be configured to the ACE. Time ranges are used to limit the amount of time an ACE is in effect.
Step 8. (Optional) From the Time Range Name drop-down list, choose a time range to apply to the ACE.
Note: You can click Edit to navigate and create a time range on the Time Range page.
Step 9. Choose a protocol type in the Protocol area. The ACE will be created based on a specific protocol or protocol ID.
The options are:
Note: In this example, Any (IP) is chosen.
Step 10. (Optional) If you chose Select from list in Step 9, choose a protocol from the drop-down list.
The options are:
Step 11. (Optional) If you chose Protocol ID to match in Step 9, enter the protocol ID in the Protocol ID to match field.
Step 12. Click the radio button that corresponds to the desired criteria of the ACE in the Source IP Address area.
The options are:
Note: In this example, User Defined is chosen. If you chose Any, skip to Step 15.
Step 13. Enter the source IP address in the Source IP Address Value field.
Note: In this example, 192.168.1.1 is used.
Step 14. Enter the source wildcard mask in the Source IP Wildcard Mask field.
Note: In this example, 0.0.0.255 is used.
Step 15. Click the radio button that corresponds to the desired criteria of the ACE in the Destination IP Address area.
The options are:
Note: In this example, Any is chosen. Choosing this option means that the ACE to be created will permit the ACE traffic coming from the specified IPv4 address to any destination.
Step 16. (Optional) Click a radio button in the Source Port area. The default value is Any.
Step 17. (Optional) Click a radio button in the Destination Port area. The default value is Any.
Step 18. (Optional) In the TCP Flags area, choose one or more TCP flags with which to filter packets. Filtered packets are either forwarded or dropped. Filtering packets by TCP flags increases packet control, which increases network security.
The TCP flags are:
Step 19. (Optional) Click the service type of the IP packet from the Type of Service area.
The options are:
– 0 — for routine
– 1 — for priority
– 2 — for immediate
– 3 — for flash
– 4 — for flash-override
– 5 — for critical
– 6 — for Internet
– 7 — for network
Step 20. (Optional) If the IP protocol of the ACL is ICMP, click the ICMP message type used for filtering purposes. Either choose the message type by name or enter the message type number:
Step 21. (Optional) The ICMP messages can have a code field that indicates how to handle the message. Click one of the following options to configure whether to filter on this code:
Step 22. (Optional) If the ACL is based on IGMP, click the IGMP message type to be used for filtering purposes. Either choose the message type by name or enter the message type number:
Step 23. Click Apply then click Close. The ACE is created and associated to the ACL name.
Step 24. Click Save to save settings to the startup configuration file.
You should now have configured an IPv4-based ACE on your switch.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
13-Dec-2018 |
Initial Release |