Quick Start

Quick Start

System Introduction

While improving enterprise efficiency dramatically, the Internet and network applications also bring negative effects. For example, sensitive data might suffer from potential security risks, and network resources are distributed irrationally. How to manage the network effectively to reduce such negative effects becomes an important problem that network administrators have to face.

ACL (Access Control List) controls network access by filtering packets that match specific ACL rules. ACL Management provides a friendly Web interface for you to perform operations simply and intuitively for access control.

Operation Guide

The workflow of ACL Management is as follows:

  1. Configure ACL resources in ACL Management to unify  the management of network-wide.
  2. Deploy the ACL resources to devices.

ACL Management comprises of the following five components:

You can configure single device or perform batch configuration for multiple devices.

The following figure illustrates the relationship among the five components.

FAQ

For more information, see FAQ.

Typical Configuration Examples