542
Configuring Access Control Lists
Using ACLs to mirror traffic is considered to be flow-based mirroring since
the traffic flow is defined by the ACL classification rules. This is in contrast to
port mirroring, where all traffic encountered on a specific interface is
replicated on another interface.
What Is ACL Logging
ACL Logging provides a means for counting the number of “hits” against an
ACL rule. When you configure ACL Logging, you augment the ACL deny
rule specification with a "log" parameter that enables hardware hit count
collection and reporting. The switch uses a fixed five minute logging interval,
at which time trap log entries are written for each ACL logging rule that
accumulated a non-zero hit count during that interval. You cannot configure
the logging interval.
What Are Time-Based ACLs?
The time-based ACL feature allows the switch to dynamically apply an
explicit ACL rule within an ACL for a predefined time interval by specifying a
time range on a per-rule basis within an ACL, so that the time restrictions are
imposed on the ACL rule.
With a time-based ACL, you can define when and for how long an individual
rule of an ACL is in effect. To apply a time to an ACL, first you define a
specific time interval and then apply it to an individual ACL rule so that it is
operational only during the specified time range, for example, during a
specified time period or on specified days of the week.
A time range can be absolute (specific time) or periodic (recurring). If an
absolute and periodic time range entry are defined within the same time
range, the periodic timer is active only when the absolute timer is active.
NOTE:
Adding a conflicting periodic time range to an absolute time range will
cause the time range to become inactive. For example, consider an absolute time
range from 8:00 AM Tuesday March 1st 2011 to 10 PM Tuesday March 1st 2011.
Adding a periodic entry using the 'weekend' keyword will cause the time-range
to become inactive because Tuesdays are not on the weekend.
Summary of Contents for PowerConnect 7024
Page 134: ...134 Setting Basic Network Information ...
Page 290: ...290 Managing General System Settings Figure 11 14 SNTP Servers Table ...
Page 348: ...348 Configuring SNMP ...
Page 430: ...430 Monitoring Switch Traffic ...
Page 444: ...444 Configuring iSCSI Optimization ...
Page 538: ...538 Configuring 802 1X and Port Based Security ...
Page 594: ...594 Configuring VLANs Figure 21 16 GVRP Port Parameters Table ...
Page 600: ...600 Configuring VLANs Figure 21 23 Double VLAN Port Parameter Table ...
Page 658: ...658 Configuring the Spanning Tree Protocol ...
Page 693: ...Configuring Port Based Traffic Control 693 Figure 24 3 Storm Control 5 Click Apply ...
Page 780: ...780 Configuring Connectivity Fault Management ...
Page 804: ...804 Snooping and Inspecting Traffic Figure 27 17 DAI Interface Configuration Summary ...
Page 818: ...818 Snooping and Inspecting Traffic ...
Page 836: ...836 Configuring Link Aggregation ...
Page 882: ...882 Configuring DHCP Server Settings ...
Page 916: ...916 Configuring L2 and L3 Relay Features Figure 33 3 DHCP Relay Interface Summary ...
Page 924: ...924 Configuring L2 and L3 Relay Features Figure 33 12 IP Helper Statistics ...
Page 930: ...930 Configuring L2 and L3 Relay Features ...
Page 1004: ...1004 Configuring OSPF and OSPFv3 ...
Page 1044: ...1044 Configuring VRRP ...
Page 1057: ...Configuring IPv6 Routing 1057 Figure 37 9 IPv6 Route Preferences ...
Page 1064: ...1064 Configuring IPv6 Routing ...
Page 1084: ...1084 Configuring DHCPv6 Server and Relay Settings ...
Page 1091: ...Configuring Differentiated Services 1091 Figure 39 5 DiffServ Class Criteria ...
Page 1114: ...1114 Configuring Differentiated Services ...
Page 1130: ...1130 Configuring Class of Service ...
Page 1136: ...1136 Configuring Auto VoIP ...
Page 1216: ...1216 Managing IPv4 and IPv6 Multicast ...