C
ONFIGURING
THE
S
WITCH
3-66
Web
– Specify the action (i.e., Permit or Deny). Specify the source and/or
destination addresses. Select the address type (Any, Host, or IP). If you
select “Host,” enter a specific address. If you select “IP,” enter a subnet
address and the mask for an address range. Set any other required criteria,
such as service type, protocol type, or TCP control code. Then click Add.
Figure 3-29. Configuring Extended IP ACLs
CLI
– This example adds three rules:
1. Accept any incoming packets if the source address is in subnet 10.7.1.x.
For example, if the rule is matched; i.e., the rule (10.7.1.0 &
255.255.255.0) equals the masked address (10.7.1.2 & 255.255.255.0),
the packet passes through.
2. Allow TCP packets from class C addresses 192.168.1.0 to any
destination address when set for destination TCP port 80 (i.e., HTTP).
Содержание 8648T - annexe 1
Страница 2: ......
Страница 34: ...INTRODUCTION 1 10 ...
Страница 48: ...INITIAL CONFIGURATION 2 14 ...
Страница 159: ...PORT CONFIGURATION 3 111 Figure 3 48 Displaying Etherlike and RMON Statistics ...
Страница 411: ...DNS COMMANDS 4 167 ...
Страница 536: ...COMMAND LINE INTERFACE 4 291 ...
Страница 542: ...TROUBLESHOOTING B 2 ...
Страница 555: ......