7. Access Control List (ACL) Commands
88
7. Access Control List (ACL) Commands
For network security protection, blocking unauthorized access from
internal and external sources is important.
Access Control is a function to filter packet transfer by setting rules
after checking the header information of packets that reach the
Switching Hub. To use the Access Control function, you need to create
an Access Control List (ACL), which defines filtering targets, conditions,
and actions, and configure target ports and VLANs.
ヱㄓㄐㄉㄊㄊㄕチㄆㄔㄔチㄆㄕㄘㄆㄆㄏ
ㄅㄆㄗㄆㄍㄐㄑㄎㄆㄏㄕチㄏㄅ
ㄔㄍㄆㄔチㄅㄆㄑㄓㄕㄎㄆㄏㄕㄔ
ヱヤ
ヱヤ
リㄏㄕㄆㄓㄏㄆㄕ
ヱㄖㄍㄊ
ㄏㄆㄕㄘㄐㄓㄌ
ュㄆㄗㄆㄍㄐㄑㄎㄆㄏㄕチㄅㄆㄑㄓㄕㄎㄆㄏㄕ
ヱヤ
ヱヤ
ヴㄍㄆㄔチㄅㄆㄑㄓㄕㄎㄆㄏㄕ
Figure 7-1 Access Control overview
Access List Profile
This Switching Hub allows you to create an ACL named as "access list profile" with IDs
1 to 6.
In a profile, you can configure filtering targets from the following various categories.
IEEE 802.1p priority
VLAN name, VLAN number
MAC address
Ether type
IP address
DSCP (Differentiated Services Code Point)
Summary of Contents for ZEQUO 6400
Page 160: ...12 Basic IP Commands 161 ...
Page 189: ...17 Command Logging Command List 190 ...
Page 554: ...49 MAC based Access Control Commands 555 ...
Page 812: ...69 QoS Commands 813 ...
Page 839: ...73 SNMPv1 v2 v3 Commands 840 Only Administrator level users can issue this command ...
Page 962: ...85 Virtual Router Redundancy Protocol VRRP Command List 963 ...
Page 1050: ...91 System Log Lists 1051 ...