ACL Configuration
293
■
auto
, where the rules in an ACL are matched in the order determined by the
system, namely the "depth-first" order.
When applying an ACL in this way, you can specify the order in which the rules in
the ACL are matched. The match order cannot be modified once it is determined,
unless you delete all the rules in the ACL and define the match order.
An ACL can be referenced by upper-layer software:
■
Referenced by routing policies
■
Used to control Telnet, SNMP and Web login users
n
When an ACL is referenced by upper-layer software to control Telnet, SNMP and
Web login users, the switch will deny packets if the packets do not match the ACL.
Types of ACLs Supported
by Switch 4210 Family
The Switch 4210 supports the following ACL types:
■
Basic ACLs
■
Advanced ACLs
n
ACLs defined on the Switch 4210 can be referenced by upper-layer software for
packet filtering. They cannot be applied to hardware
ACL Configuration
Configuring a Time
Range
Time ranges can be used to filter packets. You can specify a time range for each
rule in an ACL. A time range-based ACL takes effect only in specified time ranges.
Only after a time range is configured and the system time is within the time range,
can an ACL rule take effect.
Two types of time ranges are available:
■
Periodic time range, which recurs periodically on the day or days of the week.
■
Absolute time range, which takes effect only in a period of time and does not
recur.
n
An absolute time range on the Switch 4210 Family can be within the range
1970/1/1 00:00 to 2100/12/31 24:00.
Configuration Procedure
Table 216
Configure a time range
Operation
Command
Description
Enter system view
system-view
-
Create a time range
time-range
time-name
{
start-time
to
end-time
days-of-the-week
[
from
start-time start-date
] [
to
end-time end-date
] |
from
start-time start-date
[
to
end-time end-date
] |
to
end-time end-date
}
Required
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...