User Manual
Publication date: March, 2006
Revision A2
44
3-1-5. Management Policy
Through the management security configuration, the manager can do the
strict setup to control the switch and limit the user to access this switch.
The following rules are offered for the manager to manage the switch:
Rule 1) : When no lists exists, then it will accept all connections.
Accept
-----------------------------------------------------------------------
Rule 2) : When only “accept lists” exist, then it will deny all connections,
excluding the connection inside of the accepting range.
Accept Deny
Accept
Deny
Accept
-----------------------------------------------------------------------
Rule 3) : When only “deny lists” exist, then it will accept all connections,
excluding the connection inside of the denying range.
Deny
Accept
Deny
Accept Deny
-----------------------------------------------------------------------
Rule 4) : When both “accept and deny” lists exist, then it will deny all
connections, excluding the connection inside of the accepting range.
Accept Deny
Deny
Deny Accept
-----------------------------------------------------------------------
Rule 5) : When both “accept and deny” lists exist, then it will deny all
connections, excluding the connection inside of the accepting range and NOT
inside of the denying range at the same time.
Accept
Deny
Deny| Acc | Deny | Acc | Deny
----------------------------------------------------------------------
Accept
Содержание 3-Slot 24 Fast Ethernet + 2 Gigabit L2 Managed Switch with Redundant Power
Страница 1: ...3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch with Redundant Power User s Manual Release 2 08 ...
Страница 6: ...vi ...
Страница 8: ......
Страница 157: ...User Manual Publication date March 2006 Revision A2 149 Fig 4 1 Fig 4 2 ...
Страница 254: ......
Страница 255: ......