Defining Access Control Lists
91
Add Rules to ACL
■
Protocol
— Defines the protocol in the rule to which the packet is
matched. The possible fields are:
■
Select from List
— Selects a protocol from a list by which packets
are matched.
■
Protocol ID
— Adds user-defined protocols by which packets are
matched. Each protocol has a specific protocol number which is
unique. The possible field range is
0-255
.
■
Source Port
— Defines the source port that is used for matched
packets. Enabled only when TCP or UDP are selected in the Protocol
list. The field value is either user defined or
Any
. If
Any
is selected the
IP based ACL is applied to any source port.
■
Destination Port
— Defines the destination port that is used for
matched packets. Enabled only when TCP or UDP are selected in the
Protocol list. The field value is either user defined or
Any
. If
Any
is
selected, the IP based ACL is applied to any destination port.
■
TCP Flags
— If checked, enables configuration of TCP flags matched
to the packet. The possible fields are:
■
URG
— Urgent pointer field significant. The urgent pointer points
to the sequence number of the octet following the urgent data.
■
ACK
— Acknowledgement field significant. The acknowledgement
field is the byte number of the next byte that the sender expects to
receive from the receiver.
■
PSH
— Push (send) the data as soon as possible, without buffering.
This is used for interactive traffic.
■
RST
— Reset the connection. This invalidates the sequence
numbers and aborts the session between the sender and receiver.
■
SYN
— Synchronize Initial Sequence Numbers (ISNs). This is used to
initialize a new connection.
■
FIN
— Finish. This indicates there is no more data from the sender.
This marks a normal closing of the session between the sender and
receiver.
For each TCP flag, the possible field values are:
■
Set
— Enables the TCP flag.
■
Unset
— Disables the TCP flag.
■
Don’t Care
— Does not check the packet’s TCP flag.
Содержание 3CRDSF9PWR-US - OfficeConnect Managed Fast Ethernet PoE Switch
Страница 6: ...6 ABOUT THIS GUIDE ...
Страница 14: ......
Страница 102: ...102 CHAPTER 4 MANAGING DEVICE SECURITY ...
Страница 112: ...112 CHAPTER 5 MANAGING SYSTEM INFORMATION ...
Страница 120: ...120 CHAPTER 6 CONFIGURING PORTS ...
Страница 130: ...130 CHAPTER 7 AGGREGATING PORTS 3 Click The LACP Link Aggregation is modified and the application is updated ...
Страница 140: ...140 CHAPTER 8 CONFIGURING VLANS ...
Страница 198: ...198 CHAPTER 14 MANAGING SYSTEM FILES ...
Страница 203: ...203 2 Define the fields 3 Click The settings are applied to the selected ports and the device is updated ...
Страница 204: ...204 CHAPTER 15 MANAGING POWER OVER ETHERNET DEVICES ...
Страница 228: ...228 APPENDIX A 3COM NETWORK MANAGEMENT ...
Страница 234: ...234 APPENDIX B DEVICE SPECIFICATIONS AND FEATURES ...
Страница 238: ...238 APPENDIX C PIN OUTS ...
Страница 256: ......