Netgear GS716Tv2 GS716Tv2/GS724Tv3 Software Admin Manual - Page 165

Configuring Access Control Lists, Security, Traffic Control, Protected Ports, Refresh, Cancel, Apply

Page 165 highlights

GS716Tv2 and GS724Tv3 Software Administration Manual To display the Protected Ports Membership page: 1. Click the Security  Traffic Control  Protected Ports link. Figure 5-24 Table 5-29. Protected Ports Membership Fields Field Description Protected Port(s) The selection list consists of physical ports, protected as well as unprotected. The protected ports are highlighted to differentiate between them. No traffic forwarding is possible between two protected ports. If left unconfigured, the default state is Unprotected. 2. Click Refresh to refresh the page with the most current data from the switch. 3. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 4. If you make changes to the page, click Apply to apply the changes to the system. Configuration changes take effect immediately. Configuring Access Control Lists Access Control Lists (ACLs) ensure that only authorized users have access to specific resources while blocking off any unwarranted attempts to reach network resources. ACLs are used to provide traffic flow control, restrict contents of routing updates, decide which types of traffic are forwarded or blocked, and above all provide security for the network. GS716T/GS724T software supports IPv4 and MAC ACLs. Managing Device Security v1.0, July 2009 5-39

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

GS716Tv2 and GS724Tv3 Software Administration Manual
Managing Device Security
5-39
v1.0, July 2009
To display the Protected Ports Membership page:
1.
Click the
Security
Traffic Control
Protected Ports
link.
2.
Click
Refresh
to refresh the page with the most current data from the switch.
3.
Click
Cancel
to cancel the configuration on the screen and reset the data on the screen to the
latest value of the switch.
4.
If you make changes to the page, click
Apply
to apply the changes to the system.
Configuration changes take effect immediately.
Configuring Access Control Lists
Access Control Lists (ACLs) ensure that only authorized users have access to specific resources
while blocking off any unwarranted attempts to reach network resources. ACLs are used to
provide traffic flow control, restrict contents of routing updates, decide which types of traffic are
forwarded or blocked, and above all provide security for the network. GS716T/GS724T software
supports IPv4 and MAC ACLs.
Figure
5-24
Table
5-29. Protected Ports Membership Fields
Field
Description
Protected Port(s)
The selection list consists of physical ports, protected as well as unprotected.
The protected ports are highlighted to differentiate between them. No traffic
forwarding is possible between two protected ports. If left unconfigured, the
default state is
Unprotected
.