C
HAPTER
14
| Security Measures
Access Control Lists
– 308 –
C
ONFIGURING
A
MAC
ACL
Use the Security > ACL (Configure ACL - Add Rule - MAC) page to
configure a MAC ACL based on hardware addresses, packet format, and
Ethernet type.
CLI R
EFERENCES
◆
"permit, deny (MAC ACL)" on page 691
◆
"show ip access-list" on page 689
◆
"Time Range" on page 545
P
ARAMETERS
These parameters are displayed:
◆
Type
– Selects the type of ACLs to show in the Name list.
◆
Name
– Shows the names of ACLs matching the selected type.
◆
Action
– An ACL can contain any combination of permit or deny rules.
◆
Source/Destination Address Type
– Use “Any” to include all
possible addresses, “Host” to indicate a specific MAC address, or “MAC”
to specify an address range with the Address and Bit Mask fields.
(Options: Any, Host, MAC; Default: Any)
◆
Source/Destination MAC Address
– Source or destination MAC
address.
◆
Source/Destination Bit Mask
– Hexadecimal mask for source or
destination MAC address.
◆
Packet Format
– This attribute includes the following packet types:
■
Any
– Any Ethernet packet type.
■
Untagged-eth2
– Untagged Ethernet II packets.
■
Untagged-802.3
– Untagged Ethernet 802.3 packets.
■
tagged-eth2
– Tagged Ethernet II packets.
■
Tagged-802.3
– Tagged Ethernet 802.3 packets.
◆
VID
– VLAN ID. (Range: 1-4094)
◆
VID Bit Mask
– VLAN bit mask. (Range: 0-4094)
◆
Ethernet Type
– This option can only be used to filter Ethernet II
formatted packets. (Range: 600-ffff hex.)
A detailed listing of Ethernet protocol types can be found in RFC 1060.
A few of the more common types include 0800 (IP), 0806 (ARP), 8137
(IPX).
◆
Ethernet Type Bit Mask
– Protocol bit mask. (Range: 600-ffff hex.)
◆
Time Range
– Name of a time range.
Summary of Contents for ES3510MA
Page 1: ...Management Guide www edge core com 8 Port Layer 2 Fast Ethernet Switch...
Page 4: ...ABOUT THIS GUIDE 4...
Page 30: ...CONTENTS 30...
Page 40: ...FIGURES 40...
Page 46: ...TABLES 46...
Page 48: ...SECTION I Getting Started 48...
Page 72: ...SECTION II Web Configuration 72...
Page 88: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 88...
Page 116: ...CHAPTER 4 Basic Management Tasks Resetting the System 116...
Page 154: ...CHAPTER 5 Interface Configuration VLAN Trunking 154...
Page 216: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 216...
Page 350: ...CHAPTER 14 Security Measures DHCP Snooping 350...
Page 440: ...CHAPTER 17 IP Services Displaying the DNS Cache 440...
Page 484: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 484...
Page 554: ...CHAPTER 21 System Management Commands Switch Clustering 554...
Page 574: ...CHAPTER 22 SNMP Commands 574...
Page 582: ...CHAPTER 23 Remote Monitoring Commands 582...
Page 636: ...CHAPTER 24 Authentication Commands Management IP Filter 636...
Page 736: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 736...
Page 816: ...CHAPTER 34 VLAN Commands Configuring Voice VLANs 816...
Page 830: ...CHAPTER 35 Class of Service Commands Priority Commands Layer 3 and 4 830...
Page 848: ...CHAPTER 36 Quality of Service Commands 848...
Page 900: ...CHAPTER 38 LLDP Commands 900...
Page 910: ...CHAPTER 39 Domain Name Service Commands 910...
Page 916: ...CHAPTER 40 DHCP Commands DHCP Client 916...
Page 948: ...CHAPTER 41 IP Interface Commands IPv6 Interface 948...
Page 950: ...SECTION IV Appendices 950...
Page 982: ...INDEX 982...
Page 983: ......