An Access Control List (ACL) is a list of network traffic filters and correlated actions used to improve security. It blocks or allows users to access specific resources. An ACL contains the hosts that are permitted or denied access to the network device.
The typical ACL functionality in IPv6 is similar to ACLs in IPv4. ACLs determine which traffic to block and which traffic to forward at switch interfaces. ACLs allow filtering based upon source and destination addresses, inbound and outbound to specific interfaces. Each ACL has an implicit deny statement at the end. The rules for the ACLs are configured in the Access Control Entries (ACEs).
You should use access lists to provide a basic level of security for accessing your network. If you do not configure access lists on your network devices, all packets passing through the switch or router could be allowed onto all parts of your network.
This article provides instructions on how to configure IPv6-based ACL and ACE on a switch.
Step 1. Log in to the web-based utility then go to Access Control > IPv6-Based ACL.
Step 2. Click the Add button.
Step 3. Enter the name of the new ACL in the ACL Name field.
Note: In this example, IPv6 ACL is used.
Step 4. Click Apply then click Close.
Step 5. (Optional) Click Save to save settings in the startup configuration file.
You should now have configured an IPv6-based ACL on your switch.
When a packet is received on a port, the switch processes the frame through the first ACL. If the packet matches an ACE filter of the first ACL, the ACE action takes place. If the packet matches none of the ACE filters, the next ACL is processed. If no match is found to any ACE in all relevant ACLs, the packet is dropped by default.
In this scenario, an ACE will be created to deny traffic that is sent from a specific user-defined source IPv6 address to any destination addresses.
Note: This default action can be avoided by the creation of a low priority ACE that permits all traffic.
Step 1. On the web-based utility, go to Access Control > IPv6-Based ACE.
Important: If you have an Sx350, SG350X, Sx550X switch, change to Advanced mode by choosing Advanced from the Display Mode drop-down list in the upper-right corner of the page.
Step 2. Choose an ACL from the ACL Name drop-down list then click Go.
Note: The ACEs that are already configured for the ACL will be displayed in the table.
Step 3. Click the Add button to add a new rule to the ACL.
Note: The ACL Name field displays the name of the ACL.
Step 4. Enter the priority value for the ACE in the Priority field. ACEs with a higher priority value are processed first. The value 1 is the highest priority. It has a range of 1 to 2147483647.
Note: In this example, 3 is used.
Step 5. Click the radio button that corresponds to the desired action that is taken when a frame meets the required criteria of the ACE.
Note: In this example, Permit is chosen.
Shutdown — The switch drops packets that do not meet the required criteria of the ACE and disables the port where the packets were received. Disabled ports can be reactivated on the Port Settings page.
Step 6. (Optional) Check the Enable Logging check box to enable logging ACL flows that match the ACL rule.
Step 7. (Optional) Check the Enable Time Range check box to allow a time range to be configured to the ACE. Time ranges are used to limit the amount of time an ACE is in effect. If this is left disabled, the ACE works at any time.
Step 8. (Optional) From the Time Range Name drop-down list, choose a time range to apply to the ACE.
Note: You can click Edit to navigate and create a time range on the Time Range page.
Step 9. Choose a protocol type in the Protocol area. The ACE will be created based on a specific protocol or protocol ID.
The options are:
Note: In this example, Select from list is chosen.
Step 10. (Optional) If you chose Select from list in Step 9, choose a protocol from the drop-down list.
The options are:
Note: In this example, TCP is used.
Step 11. (Optional) If you chose Protocol ID to match in Step 9, enter the protocol ID in the Protocol ID to match field.
Note: In this example, 1 is used.
Step 12. Click the radio button that corresponds to the desired criteria of the ACE in the Source IP Address area.
The options are:
Note: In this example, User Defined is chosen. If you chose Any, skip to Step 15.
Step 13. Enter the source IP address in the Source IP Address Value field.
Note: In this example, fe80::d0ba:7021:37f7:d68d is used.
Step 14. Enter the source IP prefix length in the Source IP Prefix Length field.
Note: In this example, 128 is used.
Step 15. Click the radio button that corresponds to the desired criteria of the ACE in the DestinationIP Address area.
The options are:
Note: In this example, Any is chosen. Choosing this option means that the ACE to be created will permit the ACE traffic coming from the specified IPv6 address to any destination.
Step 16. (Optional) Click a radio button in theSource Port area. The default value is Any.
Step 17. (Optional) Click a radio button in theDestination Port area. The default value is Any.
Step 18. (Optional) In the TCP Flags area, choose one or more TCP flags with which to filter packets. Filtered packets are either forwarded or dropped. Filtering packets by TCP flags increases packet control, which increases network security.
The TCP flags are:
Step 19. (Optional) Click the service type of the IP packet from the Type of Service area.
The options are:
– 0 — for routine
– 1 — for priority
– 2 — for immediate
– 3 — for flash
– 4 — for flash-override
– 5 — for critical
– 6 — for internet
– 7 — for network
Note: In this example, Any is chosen.
Step 20. (Optional) If the IP protocol of the ACL is ICMP, click the ICMP message type used for filtering purposes. Either choose the message type by name or enter the message type number:
Note: In this example, Select from list is chosen.
Step 21. (Optional) If Select from list is chosen in Step 20, choose the control messages to filter from the possible options in the drop-down list:
Step 22. (Optional) The ICMP messages can have a code field that indicates how to handle the message. This is enabled if you choose the ICMP protocol in Step 10. Click one of the following options to configure whether to filter on this code:
Note: In this example, Any is chosen.
Step 23. Click Apply then click Close. The ACE is created and associated to the ACL name.
Step 24. Click Save to save settings to the startup configuration file.
You should now have configured an IPv6-based ACE on your switch.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
13-Dec-2018 |
Initial Release |