Operation Guide
Operation Guide
Access control list (ACL) can be used for traffic identification. You can configure an ACL that include a set of rules to identify the target packets passing through the devices. Once the ACL is deployed to the devices successfully, the devices permit or deny matching packets. An ACL identifies packets by source address, destination address, port number, and so on. ACLs can be used in other applications for traffic identification.
ACL Management supports four types of ACLs:
ACL Management provides the following features:
- ACL wizard facilitates the ACL configuration on multiple devices
- ACL deployment mechanism
- Multi-perspective task views
- Coordinate with other components, such as MPLS VPN manager and ETTH provision manager
Besides, ACL Management allows you to manage:
- ACL template—ACLs can be set as ACL templates, which can also be exported as ACL resource. This simplifies the ACL configurations on multiple devices. Also, you can use variables to customize ACL templates flexibly.
- ACL device—Enables you to customize ACL configuration on a single device, which includes configuring ACL definitions and ACL applications.
- ACL resources—Integrates ACL rule set, ACL basic configuration (such as ACL steps and matching orders) and time ranges defined in the ACL rules. ACL Management enables you to unify the management of network-wide ACL resources.
- ACL deployment—Provides a wizard to facilitate ACL resources and applications deployment on devices.
Functions