Netgear GS728TPP Manuel d'utilisateur Page 198

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 277
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 197
198
GS752TP, GS728TP, and GS728TPP Gigabit Smart Switches
Logging. When set to Enable, logging is enabled for this ACL rule (subject to
resource availability in the device). If the access list trap flag is also enabled, this
causes periodic traps to be generated indicating the number of times this rule was hit
during the current report interval. A fixed 5-minute report interval is used for the entire
system. A trap is not issued if the ACL rule hit count is 0 for the current interval. This
field is available for a deny action.
Match Every. Requires a packet to match the criteria of this ACL. Select Enable or
Disable. Match Every is exclusive to the other filtering rules, so if Match Every is
enabled, the other rules on the screen are not available.
Src IP Address. Requires a packet’s source IP address to match the address listed
here. Enter an IP address using dotted-decimal notation. The address you enter is
compared to a packet's source IP address.
Src IP Mask. Specifies the source IP address wildcard mask. Wildcard masks
determine which bits are used and which bits are ignored. A wildcard mask of
255.255.255.255 indicates that no bit is important. A wildcard mask of 0.0.0.0
indicates that all of the bits are important. Wildcard masking for ACLs operates
differently from a subnet mask. A wildcard mask is in essence the inverse of a subnet
mask. For example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, enter
0.0.0.255 in the Source IP Mask field. This field is required when you configure a
source IP address.
4. Click ADD.
Configuration changes take effect immediately.
To update an IP ACL rule, select the check box associated with the rule, update the desired
fields, and click APPLY. You cannot modify the Rule ID of an existing IP rule.
IP Extended Rules
Use the IP Extended Rules screen to define rules for IP-based extended ACLs. The access
list definition includes rules that specify whether traffic matching the criteria is forwarded
normally or discarded.
Note: There is an implicit “deny all” rule at the end of an ACL list. This rule
means that if an ACL is applied to a packet and if none of the explicit
rules match, the final implicit “deny all” rule applies and the packet is
dropped.
To configure rules for an IP ACL:
1. Click Security ACL > Advanced IP Extended Rules.
In the following screen, an extended IP ACL exists, and two rules have been configured.
Vue de la page 197
1 2 ... 193 194 195 196 197 198 199 200 201 202 203 ... 276 277

Commentaires sur ces manuels

Pas de commentaire