Netgear GS716Tv2 GS716Tv2/GS724Tv3 Software Admin Manual - Page 180

IP Binding Configuration, Apply, Security, Advanced

Page 180 highlights

GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-36. IP ACL Rule Configuration Fields (continued) Field Dst L4 Port Service Type Description Requires a packet's TCP/UDP destination port to match the port listed here. Complete one of the following fields: • Destination L4 Keyword: Select the desired L4 keyword from a list of destination ports on which the rule can be based. • Destination L4 Port Number: If the destination L4 keyword is Other, enter a user-defined Port ID by which packets are matched to the rule. Select one of the following three Match fields to use in matching packets to ACLs: • IP DSCP: Matches the packet DSCP value to the rule. Either the DSCP value or the IP Precedence value is used to match packets to ACLs. Select the desired value from the drop down menu of DSCP keyword values. • IP Precedence: Matches the packet IP Precedence value to the rule when checked. Enter the IP Precedence value to match. Either the DSCP value or the IP Precedence value is used to match packets to ACLs. • IP TOS Bits: Matches on the Type of Service bits in the IP header when checked. - TOS Bits: Requires the bits in a packet's TOS field to match the two-digit hexadecimal number entered here. - TOS Mask: Specifies the bit positions that are used for comparison against the IP TOS field in a packet. 5. Click Apply to save any changes to the running configuration. IP Binding Configuration When an ACL is bound to an interface, all the rules that have been defined are applied to the selected interface. Use the IP Binding Configuration page to assign ACL lists to ACL Priorities and Interfaces. To display the IP Binding Configuration page: 1. Click Security  ACL, then click the Advanced  IP Binding Configuration link. 5-54 v1.0, July 2009 Managing Device Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

GS716Tv2 and GS724Tv3 Software Administration Manual
5-54
Managing Device Security
v1.0, July 2009
5.
Click
Apply
to save any changes to the running configuration.
IP Binding Configuration
When an ACL is bound to an interface, all the rules that have been defined are applied to the
selected interface. Use the IP Binding Configuration page to assign ACL lists to ACL Priorities
and Interfaces.
To display the IP Binding Configuration page:
1.
Click
Security
ACL
, then click the
Advanced
IP Binding Configuration
link.
Dst L4 Port
Requires a packet’s TCP/UDP destination port to match the port listed
here. Complete one of the following fields:
Destination L4 Keyword
: Select the desired L4 keyword from a list of
destination ports on which the rule can be based.
Destination L4 Port Number
: If the destination L4 keyword is Other,
e
nter a user-defined Port ID by which packets are matched to the rule.
Service Type
Select one of the following three Match fields to use in matching packets
to ACLs:
IP DSCP
: Matches the packet DSCP value to the rule. Either the
DSCP value or the IP Precedence value is used to match packets to
ACLs. Select the desired value from the drop down menu of DSCP
keyword values.
IP Precedence
: Matches the packet IP Precedence value to the rule
when checked. Enter the IP Precedence value to match. Either the
DSCP value or the IP Precedence value is used to match packets to
ACLs.
IP TOS Bits
: Matches on the Type of Service bits in the IP header
when checked.
-
TOS Bits
: Requires the bits in a packet’s TOS field to match the
two-digit hexadecimal number entered here.
-
TOS Mask
: Specifies the bit positions that are used for comparison
against the IP TOS field in a packet.
Table
5-36. IP ACL Rule Configuration Fields (continued)
Field
Description