Netgear GS110TP GS108Tv2/GS110TP Software Reference Manual - Page 284

Standard IP ACL Example Configuration, From the IP ACL screen

Page 284 highlights

GS108T and GS110TP Smart Switch Software Administration Manual You can assign an optional sequence number to indicate the order of this access list relative to other access lists if any are already assigned to this interface and direction. 4. The MAC Binding Table displays the interface and MAC ACL binding information (See "MAC Binding Table" on page 5-49). The ACL named Sales_ACL looks for Ethernet frames with destination and source MAC addresses and MAC masks defined in the rule. Also, the frame must be tagged with VLAN ID 2, which is the Sales department VLAN. The CoS value of the frame must be 0, which is the default value for Ethernet frames. Frames that match this criteria are permitted on interfaces 6, 7, and 8 and are assigned to the hardware egress queue 0, which is the default queue. All other traffic is explicitly denied on these interfaces. To allow additional traffic to enter these ports, you must add a new permit rule with the desired match criteria and bind the rule to interfaces 6, 7, and 8. Standard IP ACL Example Configuration The following example shows how to create an IP-based ACL that prevents any IP traffic from the Finance department from being allowed on the ports that are associated with other departments. Traffic from the Finance department is identified by each packet's network IP address. 1. From the IP ACL screen, create a new IP ACL with an IP ACL ID of 1 (See "IP ACL" on page 5-50). 2. From the IP Rules screen, create a rule for IP ACL 1 with the following settings: • Rule ID: 1 • Action: Deny • Assign Queue ID: 0 (optional: 0 is the default value) • Match Every: False • Source IP Address: 192.168.187.0 • Source IP Mask: 255.255.255.0 For additional information about IP ACL rules, see "IP Rules" on page 5-52. 3. Click Add. 4. From the IP Rules screen, create a second rule for IP ACL 1 with the following settings: • Rule ID: 2 • Action: Permit • Match Every: True 5. Click Add. B-6 Configuration Examples v1.0, April 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

GS108T and GS110TP Smart Switch Software Administration Manual
B-6
Configuration Examples
v1.0, April 2010
You can assign an optional sequence number to indicate the order of this access list relative to
other access lists if any are already assigned to this interface and direction.
4.
The MAC Binding Table displays the interface and MAC ACL binding information (See
“MAC Binding Table” on page
5-49
).
The ACL named Sales_ACL looks for Ethernet frames with destination and source MAC
addresses and MAC masks defined in the rule. Also, the frame must be tagged with VLAN ID 2,
which is the Sales department VLAN. The CoS value of the frame must be 0, which is the default
value for Ethernet frames. Frames that match this criteria are permitted on interfaces 6, 7, and 8
and are assigned to the hardware egress queue 0, which is the default queue. All other traffic is
explicitly denied on these interfaces. To allow additional traffic to enter these ports, you must add
a new
permit
rule with the desired match criteria and bind the rule to interfaces 6, 7, and 8.
Standard IP ACL Example Configuration
The following example shows how to create an IP-based ACL that prevents any IP traffic from the
Finance department from being allowed on the ports that are associated with other departments.
Traffic from the Finance department is identified by each packet’s network IP address.
1.
From the IP ACL screen, create a new IP ACL with an IP ACL ID of 1 (See
“IP ACL” on
page
5-50
).
2.
From the IP Rules screen, create a rule for IP ACL 1 with the following settings:
Rule ID: 1
Action: Deny
Assign Queue ID: 0 (optional: 0 is the default value)
Match Every: False
Source IP Address: 192.168.187.0
Source IP Mask: 255.255.255.0
For additional information about IP ACL rules, see
“IP Rules” on page
5-52
.
3.
Click
Add
.
4.
From the IP Rules screen, create a second rule for IP ACL 1 with the following settings:
Rule ID: 2
Action: Permit
Match Every: True
5.
Click
Add
.