![Edge-Core Direk Tronik 24/48-Port Скачать руководство пользователя страница 144](http://html1.mh-extra.com/html/edge-core/direk-tronik-24-48-port/direk-tronik-24-48-port_management-manual_2359667144.webp)
Access Control Lists
15-2
15
the “TCP” protocol is specified, then you can also filter packets based on the
TCP control code.
•
IPv6 Standard
: IPv6 ACL mode that filters packets based on the source IPv6
address.
•
IPv6 Extended
: IPv6 ACL mode that filters packets based on the destination IP
address, as well as the type of the next header and the flow label (i.e., a request
for special handling by IPv6 routers).
•
MAC
: MAC ACL mode that filters packets based on the source or destination
MAC address and the Ethernet frame type (RFC 1060).
Web
– Click Security, ACL, Configuration. Enter an ACL name in the Name field,
select the list type (IP Standard, IP Extended, MAC, IPv6 Standard, IPv6 Extended),
and click Add to open the configuration page for the new list.
Figure 15-1 Selecting ACL Type
CLI
– This example creates a standard IP ACL named bill.
Configuring a Standard IPv4 ACL
Command Attributes
•
Action
– An ACL can contain any combination of permit or deny rules.
•
Address Type
– Specifies the source IP address. Use “Any” to include all possible
addresses, “Host” to specify a specific host address in the Address field, or “IP” to
specify a range of addresses with the Address and SubMask fields. (Options: Any,
Host, IP; Default: Any)
•
IP Address
– Source IP address.
•
Subnet Mask
– A subnet mask containing four integers from 0 to 255, each
separated by a period. The mask uses 1 bits to indicate “match” and 0 bits to
indicate “ignore.” The mask is bitwise ANDed with the specified source IP address,
and compared with the address for each IP packet entering the port(s) to which this
ACL has been assigned.
Console(config)#access-list ip standard bill
44-2
Console(config-std-acl)#
Содержание Direk Tronik 24/48-Port
Страница 2: ......
Страница 4: ...ES4524D ES4548D F0 0 0 4 E112006 CS R01 149100030400A...
Страница 22: ...xxii Tables...
Страница 26: ...xxvi Figures...
Страница 28: ...Getting Started...
Страница 50: ...Initial Configuration 2 14 2...
Страница 52: ...Switch Management Configuring Domain Name Service 29 1 Switch Clustering 30 1...
Страница 68: ...Basic System Settings 4 8 4...
Страница 118: ...Simple Network Management Protocol 11 18 11...
Страница 142: ...Configuring 802 1X Port Authentication 14 8 14...
Страница 154: ...Access Control Lists 15 12 15...
Страница 232: ...Configuring Protocol Based VLANs 25 4 25...
Страница 252: ...Quality of Service 27 8 27...
Страница 282: ...Using the Command Line Interface 31 10 31...
Страница 290: ...General Commands 33 6 33...
Страница 300: ...System Management Commands 34 10 34...
Страница 308: ...File Management Commands 35 8 35...
Страница 326: ...Event Logging Commands 37 8 37...
Страница 336: ...Time Commands 39 6 39...
Страница 406: ...Access Control List Commands 44 18 44...
Страница 418: ...Interface Commands 45 12 45...
Страница 432: ...Broadcast Storm Control Commands 47 2 47...
Страница 436: ...Rate Limit Commands 49 2 49...
Страница 478: ...VLAN Commands 52 18 52...
Страница 508: ...Quality of Service Commands 56 10 56...
Страница 518: ...Multicast Filtering Commands 57 10 57...
Страница 532: ...IPv4 Interface Commands 59 6 59...
Страница 560: ...IPv6 Interface Commands 60 28 60...
Страница 566: ...Switch Cluster Commands 61 6 61...
Страница 568: ...Appendices...
Страница 572: ...Software Specifications A 4 A TACACS Authentication Client MIB TCP MIB RFC 2012 Trap RFC 1215 UDP MIB RFC 2013...
Страница 582: ...Glossary Glossary 8...
Страница 587: ......
Страница 588: ...ES4524D ES4548D E112006 CS R01 149100030400A...