Netgear GS110TP GS108Tv2/GS110TP Software Reference Manual - Page 212

MAC ACL, Select Devices Based on Source IP Address, Apply, Security, Basic

Page 212 highlights

GS108T and GS110TP Smart Switch Software Administration Manual • To permit or deny traffic based on the TCP or UDP Source Port ID, create an Extended ACL. • To permit or deny traffic based on the TCP or UDP Destination Port ID, create an Extended ACL. 2. Click the Permit or Deny link associated with the access criteria on the ACL Wizard page. The switch redirects you to a page that contains the fields to configure the ACL rule, and several of the fields are preconfigured. For example, if you select the Permit link associated with the Select Devices Based on Source IP Address option, the Source IP Address Rules page displays, and the only information you must provide is the source IP address and source mask. 3. Configure the desired rule. 4. Click Apply to save the rule. MAC ACL A MAC ACL consists of a set of rules which are matched sequentially against a packet. When a packet meets the match criteria of a rule, the specified rule action (Permit/Deny) is taken and the additional rules are not checked for a match. There are multiple steps involved in defining a MAC ACL and applying it to the switch: 1. Use the "MAC ACL" page to create the ACL ID. 2. Use the "MAC Rules" page to create rules for the ACL. 3. Use the "MAC Binding Configuration" page to assign the ACL by its ID number to a port. 4. Optionally, use the "MAC Binding Table" page to view the configurations. To display the MAC ACL page, click Security  ACL. The MAC ACL page is under the Basic link. 5-44 v1.0, April 2010 Managing Device Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

GS108T and GS110TP Smart Switch Software Administration Manual
5-44
Managing Device Security
v1.0, April 2010
To permit or deny traffic based on the TCP or UDP Source Port ID, create an Extended
ACL.
To permit or deny traffic based on the TCP or UDP Destination Port ID, create an
Extended ACL.
2.
Click the Permit or Deny link associated with the access criteria on the ACL Wizard page.
The switch redirects you to a page that contains the fields to configure the ACL rule, and
several of the fields are preconfigured. For example, if you select the Permit link associated
with the
Select Devices Based on Source IP Address
option, the Source IP Address Rules
page displays, and the only information you must provide is the source IP address and source
mask.
3.
Configure the desired rule.
4.
Click
Apply
to save the rule.
MAC ACL
A MAC ACL consists of a set of rules which are matched sequentially against a packet. When a
packet meets the match criteria of a rule, the specified rule action (Permit/Deny) is taken and the
additional rules are not checked for a match.
There are multiple steps involved in defining a MAC ACL and applying it to the switch:
1.
Use the
“MAC ACL”
page to create the ACL ID.
2.
Use the
“MAC Rules”
page to create rules for the ACL.
3.
Use the
“MAC Binding Configuration”
page to assign the ACL by its ID number to a port.
4.
Optionally, use the
“MAC Binding Table”
page to view the configurations.
To display the MAC ACL page, click
Security
ACL
. The MAC ACL page is under the
Basic
link.