![3Com OfficeConnect WX1200 Скачать руководство пользователя страница 445](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270445.webp)
14
S
ECURITY
ACL C
OMMANDS
Use security ACL commands to configure and monitor security access
control lists (ACLs). Security ACLs filter packets to restrict or permit
network usage by certain users or traffic types, and can assign to packets
a class of service (CoS) to define the priority of treatment for packet
filtering.
(Security ACLs are different from the location policy on a WX switch,
which helps you locally control user access. For location policy
commands, see “AAA Commands” on page 201.)
Security ACL
Commands by
Usage
This chapter presents security ACL commands alphabetically. Use
Table 80 to locate commands in this chapter based on their use.
Table 80
Security ACL Commands by Usage
Type
Command
Create Security ACLs
set security acl
on page 459
display security acl
on page 450
display security acl info
on page 452
clear security acl
on page 446
Commit Security ACLs commit security acl
on page 449
rollback security acl
on page 458
Map Security ACLs
set security acl map
on page 464
display security acl map
on page 453
clear security acl map
on page 447
Monitor Security ACLs display security acl hits
on page 451
set security acl hit-sample-rate
on page 466
display security acl resource-usage
on
page 454
Содержание OfficeConnect WX1200
Страница 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Страница 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Страница 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Страница 264: ...264 CHAPTER 8 AAA COMMANDS...
Страница 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Страница 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Страница 443: ...set igmp rv 443 See Also set igmp oqi on page 437 set igmp qi on page 439 set igmp qri on page 440...
Страница 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Страница 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Страница 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Страница 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Страница 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Страница 596: ...596 CHAPTER 21 TRACE COMMANDS...
Страница 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Страница 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...