C
HAPTER
14
| Security Measures
Access Control Lists
– 321 –
To display or clear the SSH user’s public key:
1.
Click Security, SSH.
2.
Select Configure User Key from the Step list.
3.
Select Show from the Action list.
4.
Select a user from the User Name list.
5.
Select the host-key type to clear.
6.
Click Clear.
Figure 173: Showing the SSH User’s Public Key
A
CCESS
C
ONTROL
L
ISTS
Access Control Lists (ACL) provide packet filtering for IPv4 frames (based
on address, protocol, Layer 4 protocol port number or TCP control code),
IPv6 frames (based on address, DSCP, or next header type), or any frames
(based on MAC address or Ethernet type). To filter incoming packets, first
create an access list, add the required rules, and then bind the list to a
specific port.
Configuring Access Control Lists –
An ACL is a sequential list of permit or deny conditions that apply to IP
addresses, MAC addresses, or other more specific criteria. This switch tests
ingress packets against the conditions in an ACL one by one. A packet will
be accepted as soon as it matches a permit rule, or dropped as soon as it
matches a deny rule. If no rules match, the packet is accepted.
Содержание ECS4810-12M Layer 2
Страница 1: ...Management Guide www edge core com ECS4810 12M Layer 2 Gigabit Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 6: ...ABOUT THIS GUIDE 6...
Страница 54: ...SECTION I Getting Started 54...
Страница 64: ...CHAPTER 1 Introduction System Defaults 64...
Страница 82: ...CHAPTER 2 Initial Switch Configuration Managing System Files 82...
Страница 84: ...SECTION II Web Configuration 84...
Страница 102: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 102...
Страница 206: ...CHAPTER 6 VLAN Configuration Configuring VLAN Mirroring 206...
Страница 256: ...CHAPTER 11 Class of Service Layer 3 4 Priority Settings 256...
Страница 378: ...CHAPTER 14 Security Measures DHCP Snooping 378...
Страница 520: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 520...
Страница 528: ...CHAPTER 17 IP Services Displaying the DNS Cache 528...
Страница 586: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 586...
Страница 676: ...CHAPTER 22 SNMP Commands 676...
Страница 684: ...CHAPTER 23 Remote Monitoring Commands 684...
Страница 816: ...CHAPTER 27 Access Control Lists ACL Information 816...
Страница 866: ...CHAPTER 30 Port Mirroring Commands RSPAN Mirroring Commands 866...
Страница 883: ...CHAPTER 32 Automatic Traffic Control Commands 883 Trap Traffic Release Disabled Disabled Console...
Страница 884: ...CHAPTER 32 Automatic Traffic Control Commands 884...
Страница 890: ...CHAPTER 33 Address Table Commands 890...
Страница 986: ...CHAPTER 37 Class of Service Commands Priority Commands Layer 3 and 4 986...
Страница 1006: ...CHAPTER 38 Quality of Service Commands 1006...
Страница 1068: ...CHAPTER 39 Multicast Filtering Commands Multicast VLAN Registration 1068...
Страница 1092: ...CHAPTER 40 LLDP Commands 1092...
Страница 1134: ...CHAPTER 41 CFM Commands 1134...
Страница 1154: ...CHAPTER 43 Domain Name Service Commands 1154...
Страница 1160: ...CHAPTER 44 DHCP Commands DHCP Client 1160...
Страница 1194: ...CHAPTER 45 IP Interface Commands IPv6 Interface 1194...
Страница 1196: ...SECTION IV Appendices 1196...
Страница 1201: ...APPENDIX A Software Specifications Management Information Bases 1201 Trap RFC 1215 UDP MIB RFC 2013...
Страница 1202: ...APPENDIX A Software Specifications Management Information Bases 1202...
Страница 1224: ...COMMAND LIST 1224...
Страница 1234: ...INDEX 1234...
Страница 1235: ......
Страница 1236: ...ECS4810 12M E072011 ST R01 149100000142A...