C
ONFIGURING
THE
S
WITCH
3-82
- 4 (rst) – Reset
- 8 (psh) – Push
- 16 (ack) – Acknowledgement
- 32 (urg) – Urgent pointer
For example, use the code value and mask below to catch packets with
the following flags set:
- SYN flag valid, use control-code 2, control bitmask 2
- Both SYN and ACK valid, use control-code 18, control bitmask 18
- SYN valid and ACK invalid, use control-code 2, control bitmask 18
Web
– Specify the action (i.e., Permit or Deny). Specify the source and/or
destination addresses. Select the address type (Any, Host, or IP). If you
select “Host,” enter a specific address. If you select “IP,” enter a subnet
address and the mask for an address range. Set any other required criteria,
such as service type, protocol type, or TCP control code. Then click Add.
Figure 3-37 ACL Configuration - Extended IP
Summary of Contents for 6726AL2 FICHE
Page 2: ......
Page 20: ...CONTENTS xvi ...
Page 24: ...TABLES xx ...
Page 28: ...FIGURES xxiv ...
Page 38: ...INTRODUCTION 1 10 ...
Page 240: ...CONFIGURING THE SWITCH 3 190 ...
Page 502: ...TROUBLESHOOTING B 4 ...
Page 515: ......