Access control lists (acl) – Intel IXM5414E User Manual

Page 49

Advertising
background image

Intel® Blade Server Ethernet Switch Module IXM5414E

39

Access Control Lists (ACL)

You use Access Control Lists (ACLs) to control the traffic entering or exiting a network, for
example where two networks are connected, or an internal network is connected through a firewall
router to the Internet. This allows you to ensure that only authorized users have access to specific
resources while blocking off any unwarranted attempts to reach them.

You can use ACLs to:

Provide traffic flow control

Determine which types of traffic will be forwarded or blocked

Provide network security

An ACL consists of one or more rules or filtering criteria. A packet is accepted or rejected based on
whether or not it matches the criteria. After you create the set of rules for an ACL, you attach the
ACL to an interface. Filtering is done on inbound traffic.

An ACL rule may apply to any one or more of the following fields:

Source IP address

Source Port (Layer 4)

Destination IP

Destination Port (Layer 4)

IP Protocol Number

An ‘implicit deny’ rule is added to the end of every ACL. This means that if a packet does not match

any of the rules you have defined it will be dropped.

Advertising