3Com 3CBLSG24 User Guide - Page 62
Modify, the range E0:3B:4A:C2:CA:00 to E0:3B:4A:C2:CA:FF.
View all 3Com 3CBLSG24 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 62 highlights
62 CHAPTER 4: MANAGING DEVICE SECURITY Modify ■ Priority - Indicates the rule priority, which determines which rule is matched to a packet on a firstmatch basis. ■ Source MAC Address - Matches the source MAC address to which packets are addressed to the ACE. ■ Source Mask - Indicates the source MAC Address wildcard mask. Wildcards are used to mask all or part of a source address by specifying which bits are used and which are ignored. A wildcard mask of FF:FF:FF:FF:FF:FF indicates that no bit is important. A wildcard of 00.00.00.00.00.00.00 indicates that all bits are important. For example, if the source MAC address is E0:3B:4A:C2:CA:E2 and the wildcard mask is 00:00:00:00:00:FF, the first five bytes of the MAC are used, while the last byte is ignored. For the source MAC address E0:3B:4A:C2:CA:E2, this wildcard mask matches all MAC addresses in the range E0:3B:4A:C2:CA:00 to E0:3B:4A:C2:CA:FF. ■ Destination MAC Address - Matches the destination MAC address to which packets are addressed to the ACE. ■ Destination Mask - Indicates the destination MAC Address wildcard mask. Wildcards are used to mask all or part of a destination address by specifying which bits are used and which are ignored. A wildcard mask of FF:FF:FF:FF:FF indicates that no bit is important. A wildcard mask of 00.00.00.00.00.00 indicates that all bits are important. For example, if the destination MAC address is E0:3B:4A:C2:CA:E2 and the wildcard mask is 00:00:00:00:00:FF, the first five bytes of the MAC are used, while the last byte is ignored. For the destination MAC address E0:3B:4A:C2:CA:E2, this wildcard mask matches all MAC addresses in the range E0:3B:4A:C2:CA:00 to E0:3B:4A:C2:CA:FF. ■ VLAN ID - Matches the packet's VLAN ID to the ACE. The possible field values are 1 to 4093. ■ CoS - Classifies traffic based on the CoS tag value. ■ CoS Mask - Defines the CoS mask used to classify network traffic. ■ Ethertype - Provides an identifier that differentiates between various types of protocols. ■ Action - Indicates the ACL forwarding action. The port can be shut down, a trap can be sent to the network administrator, or packet is assigned rate-limiting restrictions for forwarding. The options are: