A
CCESS
C
ONTROL
L
ISTS
7-6
Web
– Specify the action (i.e., Permit or Deny). Specify the source and/or
destination addresses. Select the address type (Any, Host, or IP). If you
select “Host,” enter a specific address. If you select “IP,” enter a subnet
address and the mask for an address range. Set any other required criteria,
such as service type, protocol type, or TCP control code. Then click Add.
Figure 7-3 ACL Configuration - Extended IPv4
CLI
– This example adds three rules:
1. Accept any incoming packets if the source address is in subnet 10.7.1.x.
For example, if the rule is matched; i.e., the rule (10.7.1.0 &
255.255.255.0) equals the masked address (10.7.1.2 & 255.255.255.0),
the packet passes through.
2. Allow TCP packets from class C addresses 192.168.1.0 to any
destination address when set for destination TCP port 80 (i.e., HTTP).
Summary of Contents for WPCI-G - annexe 1
Page 2: ......
Page 26: ...TABLE OF CONTENTS xxvi ...
Page 36: ...GETTING STARTED ...
Page 72: ...MANAGING SYSTEM FILES 2 24 ...
Page 74: ...SWITCH MANAGEMENT ...
Page 90: ...CONFIGURING THE SWITCH 3 16 ...
Page 245: ...SHOWING PORT STATISTICS 8 33 Figure 8 12 Port Statistics ...
Page 252: ...ADDRESS TABLE SETTINGS 9 6 ...
Page 318: ...CLASS OF SERVICE 12 16 ...
Page 330: ...QUALITY OF SERVICE 13 12 ...
Page 348: ...DOMAIN NAME SERVICE 15 8 ...
Page 404: ...IP ROUTING 17 44 ...
Page 406: ...COMMAND LINE INTERFACE ...
Page 608: ...MIRROR PORT COMMANDS 26 4 ...
Page 644: ...SPANNING TREE COMMANDS 29 28 ...
Page 668: ...VLAN COMMANDS 30 24 ...
Page 686: ...CLASS OF SERVICE COMMANDS 31 18 ...
Page 700: ...QUALITY OF SERVICE COMMANDS 32 14 ...
Page 792: ...IP INTERFACE COMMANDS 36 50 ...
Page 818: ...APPENDICES ...
Page 824: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 828: ...TROUBLESHOOTING B 4 ...
Page 844: ...INDEX Index 6 ...
Page 845: ......