98
To configure storm constrain settings on a specified port, click the corresponding port.
To configure storm constrain settings on multiple ports, click
Config
.
4.7.3 ACL
ACL Overview
As traffic increases and network grows, network security appears more and more important. Pack filter can
effectively block unauthorized users from accessing network and control traffic volume on the network for the
purpose of conserving network resources. An access control list (ACL) implements packet filter via configured
rules and operations attached to a packet.
When the switch receives a packet, it analyzes the packet using currently applied ACL rules and then handles the
packet by preset operations (permit, prohibit or limit rate, mirroring, etc.).
ACL Type
The following 2 ACLs are supported:
MAC Based ACL: Specify operation rules based on source MAC, destination MAC, 802.1P priority, L2 protocol
type and other L2 information of the packet.
IP Based ACL: Specify operation rules based on protocol type, source IP, destination IP and protocol feature
(source/destination TCP/UDP ports) of the packet.
Содержание G3224P
Страница 1: ......