At this point, the features are added to the trunking priority. Begin
creating the priority by selecting between the protocols of IP, IPX,
AppleTalk and ‘other’. The ‘other’ value allows the user to define the
protocol value as defined in RFC 1700.
If the IP protocol is selected, additional information can be added to
the priority being created. These additional network descriptions are
activated by checking the box found to the left of each feature. The
first feature is Internet Protocol. With this feature, you can select
between TCP, UDP, ICMP, and other internet protocols. The ‘other’
value allows the user to enter an additional value which corresponds to
the information found in RFC 1700.
The second feature to limit priority is by destination address. This
feature includes both an IP address and subnet mask. For example, if
you wanted to limit the accounting department’s access to a server and
the accounting department used the subnet of 10.1.x.x, you would
type 10.1.1.1 as the address and 255.255.0.0 as the subnet mask. This
would restrict network traffic destined for that subnet to the number
of ports assigned.
The third feature is based on socket number. The choices are http,
ftp, smpt, and ‘other’. The ‘other’ value allows the user to define addi-
tional sockets available on the server.
Содержание P430
Страница 1: ......
Страница 32: ...4 14...