Netgear GS716Tv2 GS716Tv2/GS724Tv3 Software Admin Manual - Page 176

IP Extended Rule, Table, 35. IP ACL Rule Configuration Fields continued

Page 176 highlights

GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-35. IP ACL Rule Configuration Fields (continued) Field Action Assign Queue ID Match Every Source IP Address Source IP Mask Description Selects the ACL forwarding action, which is one of the following: • Permit - Forwards packets which meet the ACL criteria. • Deny - Drops packets which meet the ACL criteria. Specifies the hardware egress queue identifier used to handle all packets matching this ACL rule. Enter an identifying number from 0-3 in the appropriate field. Requires a packet to match the criteria of this ACL. Select True or False from the drop down menu. Match Every is exclusive to the other filtering rules, so if Match Every is True, the other rules on the screen are not available. Requires a packet's source port IP address to match the address listed here. Enter an IP Address in the appropriate field using dotted-decimal notation. The address you enter is compared to a packet's source IP Address. Specifies the source IP address wildcard mask. Wild card masks determines which bits are used and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all of the bits are important. Wildcard masking for ACLs operates differently from a subnet mask. A wildcard mask is in essence the inverse of a subnet mask. With a subnet mask, the mask has ones (1's) in the bit positions that are used for the network address, and has zeros (0's) for the bit positions that are not used. In contrast, a wildcard mask has (0's) in a bit position that must be checked. A '1' in a bit position of the ACL mask indicates the corresponding bit can be ignored. This field is required when you configure a source IP address. IP Extended Rule Use the IP Extended Rules page to define rules for IP-based extended ACLs. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. Note: There is an implicit "deny all" rule at the end of an ACL list. This means that if an ACL is applied to a packet and if none of the explicit rules match, then the final implicit "deny all" rule applies and the packet is dropped. To display the IP extended Rules page: 5-50 v1.0, July 2009 Managing Device Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

GS716Tv2 and GS724Tv3 Software Administration Manual
5-50
Managing Device Security
v1.0, July 2009
IP Extended Rule
Use the IP Extended Rules
page to define rules for IP-based extended ACLs. The access list
definition includes rules that specify whether traffic matching the criteria is forwarded normally or
discarded.
To display the IP extended Rules page:
Action
Selects the ACL forwarding action, which is one of the following:
Permit — Forwards packets which meet the ACL criteria.
Deny — Drops packets which meet the ACL criteria.
Assign Queue ID
Specifies the hardware egress queue identifier used to handle all
packets matching this ACL rule. Enter an identifying number from 0–3 in
the appropriate field.
Match Every
Requires a packet to match the criteria of this ACL. Select True or False
from the drop down menu. Match Every is exclusive to the other filtering
rules, so if Match Every is True, the other rules on the screen are not
available.
Source IP Address
Requires a packet’s source port IP address to match the address listed
here. Enter an IP Address in the appropriate field using dotted-decimal
notation. The address you enter is compared to a packet's source IP
Address.
Source IP Mask
Specifies the source IP address wildcard mask. Wild card masks
determines which bits are used and which bits are ignored. A wild card
mask of 255.255.255.255 indicates that no bit is important. A wildcard of
0.0.0.0 indicates that all of the bits are important. Wildcard masking for
ACLs operates differently from a subnet mask. A wildcard mask is in
essence the inverse of a subnet mask. With a subnet mask, the mask
has ones (1's) in the bit positions that are used for the network address,
and has zeros (0's) for the bit positions that are not used. In contrast, a
wildcard mask has (0’s) in a bit position that must be checked. A ‘1’ in a
bit position of the ACL mask indicates the corresponding bit can be
ignored. This field is required when you configure a source IP address.
Note:
There is an implicit “deny all” rule at the end of an ACL list. This means that if an
ACL is applied to a packet and if none of the explicit rules match, then the final
implicit “deny all” rule applies and the packet is dropped.
Table
5-35. IP ACL Rule Configuration Fields (continued)
Field
Description