Configure ACL
Access control list (ACL) uses packet filtering to efficiently prevent illegal users from accessing the network. The configure ACL function in the access device module helps you select the ACL resources before you deploy the ACL configuration to devices managed by the system.
Operation Procedure
- Select the User tab, and then in the navigation tree select User Access Policy > Access Device to enter the access device page.
- Enter the ACL configuration page.
Approach 1: After an access device is successfully added to the system, the operation result page appears. You can click the Configure ACL link.
Approach 2: After an access device is successfully modified, the operation result page appears. You can click the Configure ACL link.
- Configure the ACL. The ACL configuration page lists the devices managed and not managed by the system. Click Next to display the ACL resource list. Select the ACL resources, and click Next to enter the ACL deployment page.
Precautions
- In the ACL resource list, only the resources of the standard and extended types are listed.
- The ACL resource must contain one or more rules.
- Please add/modify ACL resources on the ACL Resource page of the ACL Management module.