Netgear GS516TP Software Administration Manual - Page 141
IP ACL, IP Rules, DELETE, To con an IP ACL, Security > ACL > Advanced > IP ACL, Rules
View all Netgear GS516TP manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 141 highlights
GS516TP Gigabit Smart Switches To delete a MAC ACL-to-interface binding, select the check box next to the interface and click DELETE. IP ACL IP ACLs allow network managers to define classification actions and rules for specific ingress ports. Packets can be filtered on ingress (inbound) ports only. If the filter rules match, some actions can be taken, including dropping the packet or disabling the port. For example, a network administrator defines an ACL rule that says port number 20 can receive TCP packets. However, if a UDP packet is received, the packet is dropped. ACLs are composed of access control entries (ACE), or rules, that consist of the filters that determine traffic classifications. Use the IP ACL screen to add or remove IP-based ACLs. To configure an IP ACL: 1. Select Security > ACL > Advanced > IP ACL. 2. In the IP ACL ID field, specify the ACL ID. The ID is an integer in one of the following ranges: • 1-99. Creates an IP standard ACL, which allows you to permit or deny traffic from a source IP address. • 100-199. Creates an IP extended ACL, which allows you to permit or deny specific types of layer 3 or layer 4 traffic from a source IP address to a destination IP address. This type of ACL provides more granularity and filtering capabilities than the standard IP ACL. Each configured ACL displays the following information: • Rules. Displays the number of rules currently configured for the IP ACL. • Type. Identifies the ACL as either a standard or extended IP ACL. 3. Click ADD. To change the name of an IP ACL, select the check box next to the IP ACL ID field, update the name, then click APPLY. IP Rules Use the IP Rules screen to define rules for IP-based standard ACLs. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. Note: There is an implicit "deny all" rule at the end of an ACL list. This rule means that if an ACL is applied to a packet and if none of the explicit rules match, the final implicit "deny all" rule applies and the packet is dropped. 141