A
CCESS
C
ONTROL
L
ISTS
3-77
Web
– Specify the action (i.e., Permit or Deny). Specify the source and/or
destination addresses. Select the address type (Any, Host, or IP). If you
select “Host,” enter a specific address. If you select “IP,” enter a subnet
address and the mask for an address range. Set any other required criteria,
such as service type, protocol type, or TCP control code. Then click Add.
CLI
– This example adds three rules:
(1)Accept any incoming packets if the source address is in subnet 10.7.1.x.
For example, if the rule is matched; i.e., the rule (10.7.1.0 & 255.255.255.0)
equals the masked address (10.7.1.2 & 255.255.255.0), the packet passes
through.
(2)Allow TCP packets from class C addresses 192.168.1.0 to any
destination address when set for destination TCP port 80 (i.e., HTTP).
Summary of Contents for 8612XL3
Page 2: ......
Page 26: ...CONTENTS xxvi ...
Page 40: ...INTRODUCTION 1 14 ...
Page 69: ...BASIC CONFIGURATION 3 15 ...
Page 175: ...PORT CONFIGURATION 3 121 ...
Page 337: ...IP ROUTING 3 283 Web Click Routing Protocol RIP Statistics ...
Page 379: ...MULTICAST ROUTING 3 325 Command Usage ...
Page 396: ...CONFIGURING THE SWITCH 3 342 ...
Page 582: ...COMMAND LINE INTERFACE 4 186 ...
Page 806: ... 224 Command Mode Privileged Exec Example Console clear vrrp 1 interface 1 counters Console ...
Page 826: ... 6 ...
Page 828: ...TROUBLESHOOTING B 2 ...
Page 838: ...GLOSSARY Glossary 10 ...
Page 845: ......