100
Quiet period
This field displays the period of the time the client has to wait
before the next re-authentication attempt.
Supp timeout
This field displays how long the Switch will wait before
communicating with the server.
Server timeout
This field displays how long the Switch will wait before
communicating with the client.
6.2.
ACL
Access control list
(
ACL
) is a list of permissions attached to an object. The list specifies who
or what is allowed to access the object and what operations are allowed to be performed on the
object.
ACL function allows user to configure a few rules to reject packets from the specific ingress
ports or all ports. These rules will check the packets’ source MAC address and destination
MAC address. If packets match these rules, the system will do the actions “deny”. “deny”
means rejecting these packets.
The Action Resolution engine collects the information (action and metering results) from the
hit entries: if more than one rule matches, the actions and meter/counters are taken from the
policy associated with the matched rule with highest priority.
Default Settings
Maximum profile
: 64.
Maximum profile name length : 16.
Notice:
The ACL name should be the combination of the digit or the alphabet.
6.2.1.
CLI Configuration
Node
Command
Description
enable
show access-list
This command displays all of the access control
profiles.
enable
configure terminal
This command changes the node to configure node.
configure no access-list
STRING
This command deletes an access control profile.
acl
show
This command displays the current access control
profile.
acl
action
(disable|drop|permit)
This command actives this profile.
disable
– disable the profile.
drop
– If packets match the profile, the packets will be
dropped.
permit
– If packets match the profile, the packets will
be forwarded.
acl
destination mac host
MACADDR
This command configures the destination MAC and
mask for the profile.
acl
destination mac
MACADDR
MACADDR
This command configures the destination MAC and
mask for the profile.
Summary of Contents for NGI-S08C2POE8
Page 1: ......
Page 22: ...22...
Page 138: ...138 Action Click Delete to remove a configured trap receiver station...