Intel® Blade Server Ethernet Switch Module IXM5414E 39
Access Control Lists (ACL)
You use Access Control Lists (ACLs) to control the traffic entering or exiting a network, for
example where two networks are connected, or an internal network is connected through a firewall
router to the Internet. This allows you to ensure that only authorized users have access to specific
resources while blocking off any unwarranted attempts to reach them.
You can use ACLs to:
• Provide traffic flow control
• Determine which types of traffic will be forwarded or blocked
• Provide network security
An ACL consists of one or more rules or filtering criteria. A packet is accepted or rejected based on
whether or not it matches the criteria. After you create the set of rules for an ACL, you attach the
ACL to an interface. Filtering is done on inbound traffic.
An ACL rule may apply to any one or more of the following fields:
• Source IP address
• Source Port (Layer 4)
• Destination IP
• Destination Port (Layer 4)
• IP Protocol Number
An ‘implicit deny’ rule is added to the end of every ACL. This means that if a packet does not match
any of the rules you have defined it will be dropped.