Linksys SGE2000 Cisco SGE2000, SGE2000P Gigabit Ethernet Switch Reference Guid - Page 90

Dest. IP Address, IP Based ACL

Page 90 highlights

Chapter 4 SGE2000/SGE2000P Gigabit Ethernet Switch Reference Guide • ICMP - Indicates if ICMP packets are permitted on the network. The possible field values are as follows:. • ICMP Code - Indicates and ICMP message code for filtering ICMP packets. ICMP packets that are filtered by ICMP message type can also be filtered by the ICMP message code. • IGMP - Filters packets by IGMP message or message types. • Source IP Address - Matches the source port IP address to which packets are addressed to the ACE. • Dest. IP Address - Matches the destination port IP address to which packets are addressed to the ACE. • Match DSCP - Matches the packet to the DSCP tag value. • Match IP Precedence - Matches the packet IP Precedence value to the ACE. Either the DSCP value or the IP Precedence value is used to match packets to ACLs. The possible field range is 0-7. • Source Port - Defines the TCP/UDP source port to which the ACE is matched. This field is active only if 800/6-TCP or 800/17-UDP are selected in the Select from List drop-down menu. The possible field range is 0 - 65535. • Destination Port - Defines the TCP/UDP destination port. This field is active only if 800/6-TCP or 800/17-UDP are selected in the Select from List drop-down menu. The possible field range is 0 65535. • Action - Indicates the action assigned to the packet matching the ACL. Packets are forwarded or dropped. In addition, the port can be shut down, a trap can be sent to the network administrator, or packet is assigned rate limiting restrictions for forwarding. The options are as follows: - Permit - Forwards packets which meet the ACL criteria. - Deny - Drops packets which meet the ACL criteria. - Shutdown - Drops packet that meets the ACL criteria, and disables the port to which the packet was addressed. Ports are reactivated from the Port Management page. Adding an IP Based Rule 1. Click Security Suite > Access Control > IP Based ACL. The IP Based ACL Page opens: 2. Click the Add ACL Rule button. The Add IP Based Rule Page opens: 82 Chapter 4: Configuring Device Security Defining Access Control

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286

82
Chapter 4: Configuring Device Security
Defining Access Control
SGE2000/SGE2000P Gigabit Ethernet Switch Reference Guide
Chapter
4
ICMP
— Indicates if ICMP packets are permitted on the network. The possible field values
are as
follows:
.
ICMP Code
— Indicates and ICMP message code for filtering ICMP packets. ICMP packets that
are filtered by ICMP message type can also be filtered by the ICMP message code.
IGMP
— Filters packets by IGMP message or message types.
Source IP Address
— Matches the source port IP address to which packets are addressed to the
ACE.
Dest. IP Address
— Matches the destination port IP address to which packets are addressed to the
ACE.
Match DSCP
— Matches the packet to the DSCP tag value.
Match IP Precedence
— Matches the packet IP Precedence value to the ACE. Either the DSCP
value or the IP Precedence value is used to match packets to ACLs. The possible field range is 0-7.
Source Port
— Defines the TCP/UDP source port to which the ACE is matched. This field is active
only if
800/6-TCP
or
800/17-UDP
are selected in the
Select from List
drop-down menu. The
possible field range is 0 - 65535.
Destination Port
— Defines the TCP/UDP destination port. This field is active only if
800/6-TCP
or
800/17-UDP
are selected in the
Select from List
drop-down menu. The possible field range is 0 -
65535.
Action
— Indicates the action assigned to the packet matching the ACL. Packets are forwarded or
dropped. In addition, the port can be shut down, a trap can be sent to the network administrator, or
packet is assigned rate limiting restrictions for forwarding. The options are as follows:
Permit
— Forwards packets which meet the ACL criteria.
Deny
— Drops packets which meet the ACL criteria.
Shutdown
— Drops packet that meets the ACL criteria, and disables the port to which the
packet was addressed. Ports are reactivated from the
Port Management
page.
Adding an IP Based Rule
1.
Click
Security Suite
>
Access Control
>
IP Based ACL
. The
IP Based ACL Page
opens:
2.
Click the
Add ACL Rule
button. The
Add IP Based Rule Page
opens: