![SMC Networks 8612T2 - annexe 1 Скачать руководство пользователя страница 115](http://html1.mh-extra.com/html/smc-networks/8612t2-annexe-1/8612t2-annexe-1_management-manual_1300239115.webp)
A
CCESS
C
ONTROL
L
ISTS
3-65
For example, use the code value and mask below to catch packets with
the following flags set:
-
SYN flag valid, use control-code 2, control bitmask 2
-
Both SYN and ACK valid, use control-code 18, control bitmask
18
-
SYN valid and ACK invalid, use control-code 2, control bitmask
18
Web
– Specify the action (i.e., Permit or Deny). Specify the source and/or
destination addresses. Select the address type (Any, Host, or IP). If you
select “Host,” enter a specific address. If you select “IP,” enter a subnet
address and the mask for an address range. Set any other required criteria,
such as service type, protocol type, or TCP control code. Then click Add.
Figure 3-29 ACL Configuration - Extended IP
Содержание 8612T2 - annexe 1
Страница 2: ......
Страница 23: ...TABLES xix ...
Страница 36: ...INTRODUCTION 1 10 ...
Страница 50: ...INITIAL CONFIGURATION 2 14 ...
Страница 161: ...PORT CONFIGURATION 3 111 Figure 3 48 Port Statistics Continued ...
Страница 248: ...CONFIGURING THE SWITCH 3 198 ...
Страница 542: ...TROUBLESHOOTING B 2 ...
Страница 555: ......