
Industrial Managed
Ethernet Switch
User Manual
錯誤
!
使用
[
常用
]
索
引標籤將
Heading
1,Product Manual
套用到您想要在此處
顯示的文字。
Page
125
of
191
ACL Entry
Definition
Range
selected, and accepting packet if
‘Permit’
is
selected
.
TOS
(
Type of
Service
)
A Differentiated Service Code Point (DSCP) field in
an IPv4 header
.
It is used for providing Quality of
Service (QoS).
The item value is between 0~63
.
Table 2.49 Summary of Label, Description, and Factory Default for Both ACL Filtering Method
LABEL
DESCRIPTION
FACTORY
DEFAULT
Index
Priority (1-128)
NONE
Name
Max length 32
NONE
Filter
Mac Base/IP Base
Mac Base
Source MAC Address
and Mask
A
:
B
:
C
:
D
:
E
:
F
.
is the MAC address
.
Mask is for bit mask checking
.
0
.
0
.
0
.
0
.
0
.
0 is for accepting all
.
Empty is as FF
:
FF
:
FF
:
FF
:
FF
:
FF
.
NONE
Destination MAC
Address and Mask
A
:
B
:
C
:
D
:
E
:
F
.
is the MAC address
.
Mask is for bit mask checking
.
0
.
0
.
0
.
0
.
0
.
0 is for accepting all
.
Empty is as FF
:
FF
:
FF
:
FF
:
FF
:
FF
.
NONE
VLAN ID
1-4094
NONE
VLAN Priority Tag
0 ~ 7
NONE
Ether Type
0-FFFF
NONE
IP Protocol
0-65535
NONE
Source IP Address
A.B.C.D is the IP address
.
Mask is for bit mask checking
.
0
.
0
.
0
.
0 is
for accepting all
.
Empty is as 255
.
255
.
255
.
255
.
NONE
Destination IP
Address
A
.
B
.
C
.
D is the IP address
.
Mask is for bit mask checking
.
0
.
0
.
0
.
0 is
for accepting all
.
Empty is as 255
.
255
.
255
.
255
.
NONE
TCP/UDP Source Port
0-65535
NONE
TCP/UDP Destination
Port
0-65535
NONE
TOS
0-63
NONE
Port
1,2,3,4,5,6,7,8
NONE
Action
Deny/Permit
NONE
The user can
Add
,
Modify
, or
Remove
each ACL entry based on the Index number as shown in Figure 2.137 and
The lower part of the ACL Information webpage is the list of all ACL entries
.
The user can browse
through the list by using the
Previous Page
and
Next Page
buttons. To remove all of the ACL entries from the list,
click on the
Clear All
button.
2.14.7 Dynamic ARP Inspection
Dynamic ARP Inspection
(DAI) is another security feature provided by EH75XX managed switch to prevent a
class of man-in-the-middle attacks. This type of attacks occurs when a malicous node intercepts packets intended
for other nodes by poisoning the ARP caches of its unsuspecting neighbors. To create the attack, the malicous
node sends ARP requests or responses mapping another node’s IP address to its own MAC address.
To prevent this kind of attack, EH75XX managed switch ensures that only valid ARP requests and responses are
forwarded. Invalid and malicous ARP packets will be dropped by the switch. DAI relies mainly on DHCP snooping
mechanism that listens to DHCP message exchanges. Then, DAI creates a bindings database of valid tuples of
MAC address and IP address. DAI is related to the function of
ARP Spoof Prevention
described in Section 2.14.4.