![Enterasys Matrix-V V2H124-24P Скачать руководство пользователя страница 127](http://html1.mh-extra.com/html/enterasys/matrix-v-v2h124-24p/matrix-v-v2h124-24p_configuration-manual_2414743127.webp)
Access Control Lists
3-77
3
Configuring an Extended IP ACL
Command Attributes
•
Action
– An ACL can contain permit rules, deny rules or a combination of both.
(Default: Permit rules)
•
Source/Destination Address Type
–
Specifies the source or destination IP address.
Use “Any” to include all possible addresses, “Host” to specify a specific host address in
the Address field, or “IP” to specify a range of addresses with the Address and SubMask
fields. (Options: Any, Host, IP; Default: Any)
•
Source/Destination IP
– Specifies the source or destination IP address.
•
Source/Destination Subnet Mask
– Subnet mask for source or destination
address. (See the description for SubMask on page 3-75.)
•
Service Type
– Packet priority settings based on the following criteria:
-
Precedence
– IP precedence level. (Range: 0-7)
-
TOS
– Type of Service level. (Range: 0-15)
-
DSCP
– DSCP priority level. (Range: 0-64)
•
Protocol
– Specifies the protocol type to match as TCP, UDP or Others, where
others indicates a specific protocol number (0-255). (Options: TCP, UDP, Others;
Default: TCP)
•
Source/Destination Port
– Source/destination port number for the specified
protocol type. (Range: 0-65535)
•
Source/Destination Port
Bitmask
– Decimal number representing the port bits to
match. (Range: 0-65535)
•
Control Code
– Decimal number (representing a bit string) that specifies flag bits
in byte 14 of the TCP header. (Range: 0-63)
•
Control Code Bitmask
– Decimal number representing the code bits to match.
The control bitmask is a decimal number (for an equivalent binary bit mask) that is
applied to the control code. Enter a decimal number, where the equivalent binary
bit “1” means to match a bit and “0” means to ignore a bit. The following bits may
be specified:
- 1 (fin) – Finish
- 2 (syn) – Synchronize
- 4 (rst) – Reset
- 8 (psh) – Push
- 16 (ack) – Acknowledgement
- 32 (urg) – Urgent pointer
For example, use the code value and mask below to catch packets with the
following flags set:
- SYN flag valid, use control-code 2, control bitmask 2
- Both SYN and ACK valid, use control-code 18, control bitmask 18
- SYN valid and ACK invalid, use control-code 2, control bitmask 18
Содержание Matrix-V V2H124-24P
Страница 2: ......
Страница 8: ...Notice vi...
Страница 22: ...Contents xx...
Страница 26: ...Tables xxiv...
Страница 30: ...Figures xxviii...
Страница 38: ...Introduction 1 8 1...
Страница 50: ...Initial Configuration 2 12 2...
Страница 159: ...Port Configuration 3 109 3 Figure 3 66 Displaying Etherlike and RMON Statistics...
Страница 234: ...Configuring the Switch 3 184 3...
Страница 480: ...Command Line Interface 4 246 4...
Страница 496: ...Index Index 4...
Страница 497: ......
Страница 498: ...Part 150200039400A FW 2 5 2 0 E012005 R02 ES3526G E072000 R04...