Operation Manual – ACLH3C S3100 Series Ethernet Switches Table of ContentsiTable of ContentsChapter 1 ACL Configuration....................................................................................................... 1-11.1 ACL Overview .................................................................................................................... 1-11.1.1 ACL Matching Order ............................................................................................... 1-11.1.2 Ways to Apply an ACL on a Switch......................................................................... 1-21.1.3 Types of ACLs Supported by S3100 Series Ethernet Switches ............................. 1-31.2 ACL Configuration.............................................................................................................. 1-41.2.1 Configuring Time Range ......................................................................................... 1-41.2.2 Configuring Basic ACL ............................................................................................ 1-51.2.3 Configuring Advanced ACL..................................................................................... 1-71.2.4 Configuring Layer 2 ACL......................................................................................... 1-81.3 ACL Assignment .............................................................................................................. 1-101.3.1 Assigning an ACL Globally.................................................................................... 1-101.3.2 Assigning an ACL to a VLAN ................................................................................ 1-111.3.3 Assigning an ACL to a Port Group ........................................................................ 1-121.3.4 Assigning an ACL to a Port ................................................................................... 1-121.4 Displaying ACL Configuration.......................................................................................... 1-131.5 Example for Upper-layer Software Referencing ACLs .................................................... 1-141.5.1 Example for Controlling Telnet Login Users by Source IP.................................... 1-141.5.2 Example for Controlling Web Login Users by Source IP ...................................... 1-141.6 Example for Applying ACLs to Hardware ........................................................................ 1-151.6.1 Basic ACL Configuration Example ........................................................................ 1-151.6.2 Advanced ACL Configuration Example................................................................. 1-161.6.3 Layer 2 ACL Configuration Example..................................................................... 1-171.6.4 Example for Applying an ACL to a Port Group ..................................................... 1-18