ACL Config
This node is only available in the NAC unified and non-NETCONF modes.
ACL Config
Procedure
- Query an ACL.
- Click ACL Config page. in the function area. Choose to open the
- Set the search criteria.
- Click
to display all matching records.
- Create an ACL.
- Modify an ACL.
- Delete an ACL.
- Click ACL Config page. in the function area. Choose to open the
- Select an ACL and click Delete. If the ACL contains rules, the system prompts you that the rules in the ACL will be deleted and asks you whether to delete the ACL.
- Click OK. If the operation succeeds, the system returns to the ACL Config page; otherwise, an error message is displayed.
- Add rules.
- Modify a rule.
- Click ACL Config page. in the function area. Choose to open the
- Select an ACL and click
to expand the ACL rules.
- Click
of a rule to modify the rule. Table 5-78 describes the parameters on the page.
Click
and
to change the order of the rule, and click Apply to make the new order take effect.
- Delete a rule.
- Click ACL Config page. in the function area. Choose to open the
- Select an ACL and click
to expand the ACL rules.
- Click
of a rule to delete the rule. In the dialog box that is displayed, click OK.
ACLv6 Config
Procedure
- Query an ACLv6.
- Click ACLv6 Config page. in the function area. Choose to open the
- Set the search criteria.
- Click
to display all matching records.
- Create an ACLv6.
- Delete an ACLv6.
- Click ACLv6 Config page. in the function area. Choose to open the
- Select an ACL and click Delete. If the ACL contains rules, the system prompts you that the rules in the ACL will be deleted and asks you whether to delete the ACL.
- Click OK. If the operation succeeds, the system returns to the ACLv6 Config page; otherwise, an error message is displayed.
- Add rules.
- Modify a rule.
- Click ACLv6 Config page. in the function area. Choose to open the
- Select an ACL and click
to expand the ACL rules.
- Click
of a rule to modify the rule. Table 5-80 describes the parameters on the page.
Click
and
to change the order of the rule, and click Apply to make the new order take effect.
- Delete a rule.
- Click ACLv6 Config page. in the function area. Choose to open the
- Select an ACL and click
to expand the ACL rules.
- Click
of a rule to delete the rule. In the dialog box that is displayed, click OK.
UCL Config
Procedure
- Query ACLs.
- Click UCL Config page. in the function area. Choose to open the
- Set the search criteria.
- Click
to display all matching records.
- Create an ACL.
- Modify an ACL.
- Delete an ACL.
- Click UCL Config page. in the function area. Choose to open the
- Select an ACL and click Delete. If the ACL contains rules, the system prompts you that the rules in the ACL will be deleted and asks you whether to delete the ACL.
- Click OK. If the operation succeeds, the system returns to the UCL Config page; otherwise, an error message is displayed.
- Add a rule.
- Modify a rule.
- Click UCL Config page. in the function area. Choose to open the
- Select an ACL and click
to expand the ACL rules.
- Click
of a rule to modify the rule. Table 5-82 describes the parameters on the page.
Click
and
to change the order of the rule, and click Apply to make the new order take effect.
- Delete a rule.
- Click UCL Config page. in the function area. Choose to open the
- Select an ACL and click
to expand the ACL rules.
- Click
of a rule to delete the rule. In the dialog box that is displayed, click OK.
Validity Time Range
Context
- A time range specifies a period of time. In practice, users may want certain ACL rules to be valid during a certain period but be invalid out of the period. That is, the ACL rules are used to filter packets based on the time range. In this case, you can set one or more time ranges, and apply the time ranges to a created ACL. Then, packets can be filtered based on the set time ranges.
- An effective period can contain periodic time ranges and valid period. A periodic time range takes effect on a certain day in a week. A validity period contains the start time and the end time.
Device Access Control
Context
When a switch functions as an HTTPS server, you can configure an ACL on the switch to allow only the specified clients to log in to the switch through HTTPS. This function improves system security.
When a switch functions as a Telnet server, you can configure an ACL on the switch to allow only the specified Telnet clients to log in to the switch through Telnet.
When you use a network management system (NMS) to manage the switch, configure SNMP ACL on the switch so that only the specified NMS can access the switch. This effectively improves switch security.
Procedure
- Choose Device Access Control page, as shown in Figure 5-152.
to access the
Table 5-84 describes parameters on the page.
- Set the configuration options and click Apply. Click OK in the displayed dialog box to complete the configuration. To clear the configuration, click Clear Settings.