92
© 2001- 2011 D-Link Corporation. All Rights Reserved.
Configuration Guide
•
The order of the rules is important: when a packet matches multiple rules, the first rule
takes precedence. Also, once you define an ACL for a given port, all traffic not specifi-
cally permitted by the ACL is denied access.
MAC ACLs
MAC ACLs are Layer 2 ACLs. You can configure the rules to inspect the following fields of a
packet:
•
Source MAC address
•
Source MAC mask
•
Destination MAC address
•
Destination MAC mask
•
VLAN ID
•
Class of Service (CoS) (802.1p)
•
Ethertype
L2 ACLs can apply to one or more interfaces.
Multiple access lists can be applied to a single interface - sequence number determines the
order of execution.
You can assign packets to queues using the assign queue option.
IP ACLs
IP ACLs classify for Layers 3 and 4.
Each ACL is a set of up to ten rules applied to inbound traffic. Each rule specifies whether the
contents of a given field should be used to permit or deny access to the network, and may
apply to one or more of the following fields within a packet:
•
Destination IP with wildcard mask
•
Destination L4 Port
•
Every Packet
•
IP DSCP
•
IP Precedence
•
IP TOS
•
Protocol
•
Source IP with wildcard mask
•
Source L4 port
•
Destination Layer 4 port
Содержание UNIFIED WIRED & WIRELESS ACCESS SYSTEM...
Страница 2: ...2 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 12: ...12 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 14: ...14 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 32: ...32 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 40: ...40 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 44: ...44 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 55: ...Web Examples 55 6 IGMP Snooping Figure 19 IGMP Snooping Multicast Router VLAN Configuration Page ...
Страница 56: ...56 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 66: ...66 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 84: ...84 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 90: ...90 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 103: ...Web Examples 103 15 Access Control Lists ACLs Figure 57 Attach IP ACL to an Interface ...
Страница 110: ...110 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 123: ...Web Examples 123 18 Port Security Figure 70 Port Security Violation Status ...
Страница 124: ...124 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 129: ...RADIUS Configuration Examples 129 19 RADIUS Figure 73 Configuring the RADIUS Server ...
Страница 137: ...TACACS Configuration Example 137 20 TACACS Figure 82 Set the User Login TACACS ...
Страница 138: ...138 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 146: ...146 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 166: ...166 2001 2011 D Link Corporation All Rights Reserved Configuration Guide Figure 109 DHCP Filter Binding Information ...
Страница 176: ...176 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Страница 183: ...Web Interface Examples 183 28 Simple Network Time Protocol SNTP Figure 115 Summer Time Configuration Page ...
Страница 184: ...184 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...