Chapter 12
| Security Measures
Access Control Lists
– 268 –
The following items are under TCP
■
Control Code
– Decimal number (representing a bit string) that specifies
flag bits in byte 14 of the TCP header. (Range: 0-63)
■
Control Code Bit Mask
– Decimal number representing the code bits to
match. (Range: 0-63)
The control bit mask is a decimal number (for an equivalent binary bit mask)
that is applied to the control code. Enter a decimal number, where the
equivalent binary bit “1” means to match a bit and “0” means to ignore a bit.
The following bits may be specified:
■
1 (fin) – Finish
■
2 (syn) – Synchronize
■
4 (rst) – Reset
■
8 (psh) – Push
■
16 (ack) – Acknowledgement
■
32 (urg) – Urgent pointer
For example, use the code value and mask below to catch packets with the
following flags set:
■
SYN flag valid, use control-code 2, control bit mask 2
■
Both SYN and ACK valid, use control-code 18, control bit mask 18
■
SYN valid and ACK invalid, use control-code 2, control bit mask 18
◆
Service Type
– Packet priority settings based on the following criteria:
■
Precedence
– IP precedence level. (Range: 0-7)
■
DSCP
– DSCP priority level. (Range: 0-63)
◆
Time Range
– Name of a time range.
Web Interface
To add rules to an IPv4 Extended ACL:
1.
Click Security, ACL.
2.
Select Configure ACL from the Step list.
3.
Select Add Rule from the Action list.
4.
Select IP Extended from the Type list.
5.
Select the name of an ACL from the Name list.
6.
Specify the action (i.e., Permit or Deny).
Summary of Contents for GEL-1061
Page 14: ...Contents 14...
Page 28: ...Section I Getting Started 28...
Page 38: ...Chapter 1 Introduction System Defaults 38...
Page 40: ...Section II Web Configuration 40...
Page 60: ...Chapter 2 Using the Web Interface Navigating the Web Browser Interface 60...
Page 164: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 164...
Page 192: ...Chapter 8 Congestion Control Storm Control 192...
Page 204: ...Chapter 9 Class of Service Layer 3 4 Priority Settings 204...
Page 216: ...Chapter 10 Quality of Service Attaching a Policy Map to a Port 216...
Page 430: ...Chapter 14 Multicast Filtering MLD Snooping Snooping and Query for IPv4 430...
Page 436: ...Chapter 15 IP Tools Address Resolution Protocol 436...
Page 474: ...Section III Appendices 474...
Page 492: ...Glossary 492...
Page 500: ...E052016 ST R02 150200001416A...