94
C
HAPTER
4: M
ANAGING
D
EVICE
S
ECURITY
The
IP Based ACL Remove Page
contains the following fields:
■
ACL Name
— Selects an ACL name from a list of the IP-based ACLs.
■
Remove ACL
— Enables the ACL to be removed.
■
Checkbox (unnamed) — When checked, selects the rule for removal.
The top checkbox is used to select all rules for removal.
■
Protocol
— Indicates the protocol in the rule to which the packet is
matched.
■
Source Port
— Displays the TCP/UDP source port to which the ACL is
matched.
■
Destination Port
— Displays the TCP/UDP destination port.
■
Flag Set
— Indicates the TCP flag matched to the packet.
■
Source IP Address
— Indicates the source IP address.
■
Source Mask
— Indicates the source IP address mask.
■
Destination IP Address
— Indicates the destination IP address.
■
Destination Mask
— Indicates the destination IP address mask.
■
DSCP
— Matches the packet DSCP value to the ACL. Either the DSCP
value or the IP Precedence value is used to match packets to ACLs.
■
IP Precedence
— Matches the packet IP Precedence value to the ACL.
■
Action
— Indicates the ACL forwarding action. The options are as
follows:
■
Permit
— Forwards packets which meet the ACL criteria.
■
Deny
— Drops packets which meet the ACL criteria.
To remove an IP-based ACL:
1
Select an ACL Name to be removed.
2
Check
Remove ACL
.
3
Click
. The selected ACL is deleted, and the device is updated.
To remove IP-based ACL rules:
1
Select an ACL Name.
2
For each rule to be removed, check the box to the left of the row in the
rules table. To remove all rules, the topmost box may be checked.
3
Click
. The selected ACL rules are deleted, and the device is
updated.
Summary of Contents for 3CRDSF9PWR-US - OfficeConnect Managed Fast Ethernet PoE Switch
Page 6: ...6 ABOUT THIS GUIDE ...
Page 14: ......
Page 102: ...102 CHAPTER 4 MANAGING DEVICE SECURITY ...
Page 112: ...112 CHAPTER 5 MANAGING SYSTEM INFORMATION ...
Page 120: ...120 CHAPTER 6 CONFIGURING PORTS ...
Page 140: ...140 CHAPTER 8 CONFIGURING VLANS ...
Page 198: ...198 CHAPTER 14 MANAGING SYSTEM FILES ...
Page 204: ...204 CHAPTER 15 MANAGING POWER OVER ETHERNET DEVICES ...
Page 228: ...228 APPENDIX A 3COM NETWORK MANAGEMENT ...
Page 234: ...234 APPENDIX B DEVICE SPECIFICATIONS AND FEATURES ...
Page 238: ...238 APPENDIX C PIN OUTS ...
Page 256: ......