Chapter 12
| Security Measures
Access Control Lists
– 268 –
The following items are under TCP
■
Control Code
– Decimal number (representing a bit string) that specifies
flag bits in byte 14 of the TCP header. (Range: 0-63)
■
Control Code Bit Mask
– Decimal number representing the code bits to
match. (Range: 0-63)
The control bit mask is a decimal number (for an equivalent binary bit mask)
that is applied to the control code. Enter a decimal number, where the
equivalent binary bit “1” means to match a bit and “0” means to ignore a bit.
The following bits may be specified:
■
1 (fin) – Finish
■
2 (syn) – Synchronize
■
4 (rst) – Reset
■
8 (psh) – Push
■
16 (ack) – Acknowledgement
■
32 (urg) – Urgent pointer
For example, use the code value and mask below to catch packets with the
following flags set:
■
SYN flag valid, use control-code 2, control bit mask 2
■
Both SYN and ACK valid, use control-code 18, control bit mask 18
■
SYN valid and ACK invalid, use control-code 2, control bit mask 18
◆
Service Type
– Packet priority settings based on the following criteria:
■
Precedence
– IP precedence level. (Range: 0-7)
■
DSCP
– DSCP priority level. (Range: 0-63)
◆
Time Range
– Name of a time range.
Web Interface
To add rules to an IPv4 Extended ACL:
1.
Click Security, ACL.
2.
Select Configure ACL from the Step list.
3.
Select Add Rule from the Action list.
4.
Select IP Extended from the Type list.
5.
Select the name of an ACL from the Name list.
6.
Specify the action (i.e., Permit or Deny).
Содержание GEL-1061
Страница 14: ...Contents 14...
Страница 28: ...Section I Getting Started 28...
Страница 38: ...Chapter 1 Introduction System Defaults 38...
Страница 40: ...Section II Web Configuration 40...
Страница 60: ...Chapter 2 Using the Web Interface Navigating the Web Browser Interface 60...
Страница 164: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 164...
Страница 192: ...Chapter 8 Congestion Control Storm Control 192...
Страница 204: ...Chapter 9 Class of Service Layer 3 4 Priority Settings 204...
Страница 216: ...Chapter 10 Quality of Service Attaching a Policy Map to a Port 216...
Страница 430: ...Chapter 14 Multicast Filtering MLD Snooping Snooping and Query for IPv4 430...
Страница 436: ...Chapter 15 IP Tools Address Resolution Protocol 436...
Страница 450: ...Chapter 16 IP Services Dynamic Host Configuration Protocol 450 Figure 301 Enabling Dynamic Provisioning via DHCP...
Страница 474: ...Section III Appendices 474...
Страница 492: ...Glossary 492...
Страница 500: ...E052016 ST R02 150200001416A...