A VLAN access control list (VACL) provides access control for all packets that are bridged within a VLAN or that are routed into or out of a VLAN. Unlike regular Cisco IOS access control lists that are configured on router interfaces and applied on routed packets only, VACLs apply to all packets. The technology was developed by Cisco on the Catalyst 6500 Series switch platform.[1]

VACLs may be used in similar fashion to a SPAN port or network tap, as a way to replicate computer network data that is coming into and leaving from a computer or a network. This is useful if you want to monitor traffic. Often, this configuration is used to facilitate data loss prevention (DLP) or network-based Intrusion prevention systems.[2]

VACL or VACL Ports can be much more discriminating of the traffic they forward compared to a standard SPAN port. They may be set to only forward specific types or specific VLANs to the monitoring port. However, they forward all traffic that matches the criteria, as they do not have the functionality to select from ingress or egress traffic like SPAN ports.[3]

See also

References

  1. "Introduction". Cisco.com. Retrieved December 1, 2016.
  2. "Securing Networks with Private VLANs and VLAN Access Control Lists". Cisco.com. May 8, 2008. Retrieved December 1, 2016.
  3. "Using RSPAN with VACLs for Granular Traffic Analysis". Using RSPAN with VACLs for Granular Traffic Analysis. Retrieved December 1, 2016.


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.