206
Chapter 18
Access control list configuration
Chapter contents
Introduction
........................................................................................................................................................208
About access control lists
.....................................................................................................................................208
What access lists do
.......................................................................................................................................208
Why you should configure access lists
...........................................................................................................208
When to configure access lists
.......................................................................................................................209
Features of access control lists
.......................................................................................................................209
Access control list configuration task list
..............................................................................................................210
Mapping out the goals of the access control list
.............................................................................................210
Creating an access control list profile and enter configuration mode
.............................................................211
Adding a filter rule to the current access control list profile
...........................................................................211
Adding an ICMP filter rule to the current access control list profile
..............................................................213
Adding a TCP, UDP or SCTP filter rule to the current access control list profile
.........................................215
Binding and unbinding an access control list profile to an IP interface
..........................................................217
Displaying an access control list profile
.........................................................................................................218
Debugging an access control list profile
.........................................................................................................218
Examples
.............................................................................................................................................................220
Denying a specific subnet
..............................................................................................................................220
Содержание SmartWare R.3.20
Страница 553: ...553 Appendix A Terms and definitions Chapter contents Introduction 554 SmartWare architecture terms and definitions 554...
Страница 559: ...559 Appendix B Mode summary Chapter contents Introduction 560...
Страница 566: ...566 Appendix D Internetworking terms acronyms Chapter contents Abbreviations 568...
Страница 571: ...571 Appendix E Used IP ports available voice codecs Chapter contents Used IP ports 573 Available voice codecs 574...