Netgear GS516TP Software Administration Manual - Page 141

IP ACL, IP Rules, DELETE, To con an IP ACL, Security > ACL > Advanced > IP ACL, Rules

Page 141 highlights

GS516TP Gigabit Smart Switches To delete a MAC ACL-to-interface binding, select the check box next to the interface and click DELETE. IP ACL IP ACLs allow network managers to define classification actions and rules for specific ingress ports. Packets can be filtered on ingress (inbound) ports only. If the filter rules match, some actions can be taken, including dropping the packet or disabling the port. For example, a network administrator defines an ACL rule that says port number 20 can receive TCP packets. However, if a UDP packet is received, the packet is dropped. ACLs are composed of access control entries (ACE), or rules, that consist of the filters that determine traffic classifications. Use the IP ACL screen to add or remove IP-based ACLs.  To configure an IP ACL: 1. Select Security > ACL > Advanced > IP ACL. 2. In the IP ACL ID field, specify the ACL ID. The ID is an integer in one of the following ranges: • 1-99. Creates an IP standard ACL, which allows you to permit or deny traffic from a source IP address. • 100-199. Creates an IP extended ACL, which allows you to permit or deny specific types of layer 3 or layer 4 traffic from a source IP address to a destination IP address. This type of ACL provides more granularity and filtering capabilities than the standard IP ACL. Each configured ACL displays the following information: • Rules. Displays the number of rules currently configured for the IP ACL. • Type. Identifies the ACL as either a standard or extended IP ACL. 3. Click ADD. To change the name of an IP ACL, select the check box next to the IP ACL ID field, update the name, then click APPLY. IP Rules Use the IP Rules screen to define rules for IP-based standard ACLs. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. Note: There is an implicit "deny all" rule at the end of an ACL list. This rule means that if an ACL is applied to a packet and if none of the explicit rules match, the final implicit "deny all" rule applies and the packet is dropped. 141

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

141
GS516TP Gigabit Smart Switches
To delete a MAC ACL-to-interface binding, select the check box next to the interface and click
DELETE
.
IP ACL
IP ACLs allow network managers to define classification actions and rules for specific ingress
ports. Packets can be filtered on ingress (inbound) ports only. If the filter rules match, some
actions can be taken, including dropping the packet or disabling the port. For example, a
network administrator defines an ACL rule that says port number 20 can receive TCP
packets. However, if a UDP packet is received, the packet is dropped.
ACLs are composed of access control entries (ACE), or rules, that consist of the filters that
determine traffic classifications.
Use the IP ACL screen to add or remove IP-based ACLs.
To configure an IP ACL:
1.
Select
Security > ACL > Advanced > IP ACL
.
2.
In the IP ACL ID field, specify the ACL ID. The ID is an integer in one of the following
ranges:
1–99
. Creates an IP standard ACL, which allows you to permit or deny traffic from a
source IP address.
100–199
. Creates an IP extended ACL, which allows you to permit or deny specific
types of layer 3 or layer 4 traffic from a source IP address to a destination IP address.
This type of ACL provides more granularity and filtering capabilities than the standard
IP ACL.
Each configured ACL displays the following information:
Rules
. Displays the number of rules currently configured for the IP ACL.
Type
. Identifies the ACL as either a standard or extended IP ACL.
3.
Click
ADD
.
To change the name of an IP ACL, select the check box next to the IP ACL ID field, update
the name, then click
APPLY.
IP Rules
Use the IP Rules screen to define rules for IP-based standard ACLs. The access list
definition includes rules that specify whether traffic matching the criteria is forwarded
normally or discarded.
Note:
There is an implicit “deny all” rule at the end of an ACL list. This rule
means that if an ACL is applied to a packet and if none of the explicit
rules match, the final implicit “deny all” rule applies and the packet is
dropped.