
Industrial Managed
Ethernet Switch
User Manual
錯誤
!
使用
[
常用
]
索
引標籤將
Heading
1,Product Manual
套用到您想要在此處
顯示的文字。
Page
122
of
191
Snooping. To configure specific port(s) as trusted port(s), simply check the box under the
Trust
column for that
particular
Port
(s). Finally, click the
Update
button at the bottom of the webpage to activate the
DHCP Snooping
on the selected port(s). Note that the table inside the
DHCP Data
box will show information of the
IP
-to-
MAC
mapping, the
Request Port
and
Lease Time
of DHCP. To obtain the lastest information on the bindings table, click
on the
Refresh
button.
Figure 2.136 DHCP Snooping Webpage
2.14.6 ACL
Access Control List (ACL) is the mechanism for network access control
.
The users configure the switch
’s filtering
rules for accepting or rejecting some packets
.
Two types of filters are deployed in the EH75XX series:
1) by MAC layer, and
2) by IP layer
.
The numbers of matching rules can be at most 128
.
However, the main important rules that are mostly exercise are
follows
.
Rules for filtering by MAC layer includes MAC address, VLAN ID or Ether type
.
Whereas, rules for filtering
by IP layer includes IP protocol, IP address, TCP/UDP port or Type of Service (TOS). When filtering is enabled, the
matching rules are used to check whether the receiving packet is matched
.
If it is match, the packet will be rejected;
otherwise it will be accepted
.
Note here that the matching rules later will be referred to as the entries of ACL
.
The ACL webpage is depicted in Figure 2.137. To differentiate between each ACL entry
, Index
number from 1 to
128 is used. The ACL entry that has higher priority will be checked first before the lower priority. The
Name
field is
for setting name of this rule
.
Type of filtering whether MAC layer
(“
Mac Base
”) and IP layer (“
IP Base
”) can be set
in the
Filter
field. Note that when change from Mac Base to IP Base the required parameters for ACL setting will
be changed accordingly.