10-78
IPv4 Access Control Lists (ACLs)
Configuring Extended ACLs
[ precedence < 0 - 7 |
precedence-name
>]
This option causes the ACE to match packets with the
specified IP precedence value. Values can be entered as the
following IP precedence numbers or alphanumeric names:
0
or
routine
1
“
priority
2
“
immediate
3
“
flash
4
“
flash-override
5
“
critical
6
“
internet (for internetwork control)
7
“
network (for network control)
Note:
The precedence criteria described in this section are
applied in addition to any other selection criteria config-
ured in the same ACE.
[ tos ]
This option can be used after the DA to cause the ACE to
match packets with the specified Type-of-Service (ToS) set-
ting. ToS values can be entered as the following numeric
settings or, in the case of 0, 2, 4, and 8, as alphanumeric
names:
0
or
normal
2
“
max-reliability
4
“
max-throughput
6
8
“
minimize-delay
10
12
14
Note:
The ToS criteria in this section are applied in addi-
tion to any other criteria configured in the same ACE.
[log]
Optional; generates an Event Log message if:
•
The action is
deny
.
(This option is not configurable for
Permit.)
•
There is a match.
•
ACL logging is enabled on the switch. (Refer to
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......