The Network Control module enables a super-admin or controller to restrict inbound traffic to the A10 Control system by configuring Access Control List (ACL). ACLs act as a whitelist gatekeeper, and only the IPs you specify are allowed. This ensures that management and data interfaces access points are not left open to the entire network.
ACLs ensures consistent enforcement of access policies. Super-admins can define source IP addresses/CIDRs per A10 control services to whitelist the clients accessing the following A10 control services:
The A10 Control system includes a predefined set of Access Control List (ACL) rules for both IPv4 and IPv6 addresses. By default, the SSH, HTTPS, and sFlow services are accessible from any IP address. You can create custom ACL rules to restrict or allow access based on your business needs.
Common Use Cases
| NOTE: |
Consider the following when configuring SSH or HTTPS rules: |
Limitations
Editing the ACL is not supported.
Navigate to Settings > Network Control > ACL Config to manage ACL inbound rules.
Figure 52 : Access Control List
On the Access Control Inbound Rules page, you can also perform the following:
Other Actions: Click the Kebab menu corresponding to the required ACL to perform the following:
Delete: Click Delete to delete an ACL inbound rule.
On the Delete Access Control Inbound Rules dialog, click Yes. A confirmation message is displayed.