99
3-8. ACL
The GS-2224L switch access control list (ACL) is probably the most
commonly used object in the IOS. It is used for packet filtering but also for selecting
types of traffic to be analyzed, forwarded, or influenced in some way.
The ACLs are divided into EtherTypes. IPv4, ARP protocol, MAC and VLAN
parameters etc. Here we will just go over the standard and extended access lists for
TCP/IP. As you create ACEs for ingress classification, you can assign a policy for
each port, the policy number is 1-8, however, each policy can be applied to any port.
This makes it very easy to determine what type of ACL policy you will be working
with.
3-8-1.Ports
Function name:
ACL Port Configuration
Function description:
The switch ACL function support up to 128 Access Control Entries (ACEs),
using the shared 128 ACEs for ingress classification. You can create an ACE
and assign this ACE for each port with <Any> or assign this ACE for a policy
or assign this ACE for a port. There are 8 policies, each port can select one of
policy, then decides which of the following actions would take according to the
packet’s IPv4, EtherType, ARP Protocol, MAC Parameters and VLAN
parameters:
-
Packet Deny or Permit
-
Rate Limiter (Unit: pps)
-
Port Copy (1 – 24)
Parameter description:
Port #:
Port number: 1~24
Policy ID:
Policy ID range:1~8
Action:
Permit or Deny forwarding the met ACL packets
Rate Limiter ID:
Disabled: Disable Rate Limitation
Rate Limiter ID Range: 1~16. To select one of rate limiter ID for this port,
it will limit met ACL packets by rate limiter ID configuration.
Port Copy:
Disabled: Disable to copy the met ACL packets to specific port
Port number: 1~24. Copy the met ACL packets to the selected port
Содержание GS-2224L
Страница 1: ......
Страница 2: ......
Страница 34: ...24 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection ...
Страница 78: ...68 Fig 3 28 ...
Страница 83: ...73 Fig 3 31 ...
Страница 91: ...81 Fig 3 39 Fig 3 40 Fig 3 41 ...
Страница 103: ...93 Fig 3 54 Set up Typical Network Application Rules Finish Fig 3 55 Set up Typical Network Application Rules Finish ...
Страница 113: ...103 Fig 3 67 Ingress Port Fig 3 68 ...
Страница 115: ...105 Fig 3 71 Fig 3 72 Fig 3 73 ARP Fig 3 74 ARP ...
Страница 116: ...106 Fig 3 75 ARP Fig 3 76 ARP Fig 3 77 ARP Fig 3 78 ARP ...
Страница 117: ...107 Fig 3 79 ARP Fig 3 80 ARP Fig 3 81 ARP Fig 3 82 ARP ...
Страница 118: ...108 Fig 3 83 ARP Fig 3 84 ARP Fig 3 85 ARP Fig 3 86 ARP Fig 3 87 ARP ...
Страница 119: ...109 Fig 3 88 IPv4 Fig 3 89 IPv4 Fig 3 90 IPv4 ...
Страница 120: ...110 Fig 3 91 IPv4 Fig 3 92 IPv4 Fig 3 93 IPv4 Fig 3 94 IPv4 Fig 3 95 IPv4 ...
Страница 121: ...111 Fig 3 96 IPv4 Fig 3 97 IPv4 Fig 3 98 IPv4 Fig 3 99 IPv4 Fig 3 100 IPv4 ...
Страница 122: ...112 Fig 3 101 IPv4 Fig 3 102 IPv4 Fig 3 103 IPv4 Fig 3 104 IPv4 ...
Страница 123: ...113 Fig 3 105 IPv4 Fig 3 106 IPv4 Fig 3 107 IPv4 ...
Страница 124: ...114 Fig 3 108 IPv4 Fig 3 109 IPv4 Fig 3 110 IPv4 Fig 3 111 IPv4 ...
Страница 125: ...115 Fig 3 112 IPv4 Fig 3 113 IPv4 Fig 3 114 IPv4 ...
Страница 126: ...116 Fig 3 115 IPv4 Fig 3 116 IPv4 Fig 3 117 IPv4 ...
Страница 127: ...117 Fig 3 118 Action Fig 3 119 Rate Limiter ...
Страница 128: ...118 Fig 3 120 Port Copy Fig 3 121 DMAC Filter ...
Страница 129: ...119 Fig 3 122 VLAN ID Filter Fig 3 123 VLAN ID Filter Fig 3 124 Tag Priority ...
Страница 141: ...131 Fig 3 126 Set up Policy Rules Fig 3 127 Set up Policy Rules Fig 3 128 Set up Policy Rules ...
Страница 142: ...132 Fig 3 129 Set up Policy Rules Finish Fig 3 130 Set up Port Policies Fig 3 131 Set up Port Policies ...
Страница 143: ...133 Fig 3 132 Set up Port Policies Fig 3 133 Set up Port Policies Finish ...
Страница 144: ...134 Fig 3 134 Set up Typical Network Application Rules Fig 3 135 Set up Typical Network Application Rules ...
Страница 150: ...140 Delete Select one of entry from the table then click on Delete to delete this entry Fig 3 143 ...
Страница 159: ...149 Fig 3 145 ...
Страница 204: ...194 Fig 4 1 Fig 4 2 ...