![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/c/53/c53cc257-8ee0-4a72-a6a3-97f62f9e83ed/c53cc257-8ee0-4a72-a6a3-97f62f9e83ed-bg179.png)
19
CONFIGURING AND MANAGING
SECURITY ACLS
A security access control list (ACL) filters packets for the purpose of
discarding them, permitting them, or permitting them with modification
(marking) for class-of-service (CoS) priority treatment. A typical use of
security ACLs is to enable users to send and receive packets within the
local intranet, but restrict incoming packets to the server in which
confidential salary information is stored.
About Security
Access Control Lists
3Com provides a very powerful mapping application for security ACLs. In
addition to being assigned to physical ports, VLANs, virtual ports in a
VLAN, or Distributed MAPs, ACLs can be mapped dynamically to a user’s
session, based on authorization information passed back from the AAA
server during the user authentication process.
Overview of Security
ACL Commands
Figure 29 provides a visual overview of the way you use MSS commands
to set a security ACL, commit the ACL so it is stored in the configuration,
and map the ACL to a user session, VLAN, port, virtual port, or
Distributed MAP.