54
Chapter 6
Access control list configuration
Chapter contents
Introduction
..........................................................................................................................................................55
About access control lists
.......................................................................................................................................55
What access lists do
.........................................................................................................................................55
Why you should configure access lists
.............................................................................................................55
When to configure access lists
.........................................................................................................................56
Features of access control lists
.........................................................................................................................56
Access control list configuration task list
................................................................................................................57
Mapping out the goals of the access control list
...............................................................................................57
Creating an access control list profile and enter configuration mode
...............................................................58
Adding a filter rule to the current access control list profile
.............................................................................58
Adding an ICMP filter rule to the current access control list profile
................................................................60
Adding a TCP, UDP or SCTP filter rule to the current access control list profile
...........................................62
Binding and unbinding an access control list profile to an IP interface
............................................................64
Displaying an access control list profile
...........................................................................................................65
Debugging an access control list profile
...........................................................................................................65
Examples
...............................................................................................................................................................67
Denying a specific subnet
................................................................................................................................67
Содержание OnSite 3210 Series
Страница 87: ...87 Chapter 8 LEDs status and monitoring Chapter contents Status LEDs 88...
Страница 100: ...100 Appendix C Cabling Chapter contents Introduction 101 Serial console 101 Ethernet 10Base T and 100Base T 102...
Страница 107: ...107 Appendix E OnSite 3210 Series factory configuration Chapter contents Introduction 108...
Страница 109: ...109 Appendix F Installation checklist Chapter contents Introduction 110...