
57
Remove all of the ACE rule table under a ACL, click "Delete":
Figure 6-37:
Delete ACL Rules
Configuration instructions
Delete - after the success of the kneeling in port configuration table deleted together.
6.7.2
Application ACL
6.7.2.1
View application ACL
The configuration information and click on the "Fault/Safety" "Access Control" "Apply ACL" can view access control
using ACL:
Figure 6-38:
View Application ACL Rules
Summary of Contents for ECS2020 Series
Page 99: ...99 Figure 7 52 Use SSH2 Login...
Page 100: ...100 Figure 7 53 Use SSH1 Login...
Page 115: ...E022019 CS R02...