Netgear GS724TPv2 User Manual - Page 241
Sequence Number, Action, Permit, Egress Queue, Logging, Enable, Match Every, False, Protocol Type
View all Netgear GS724TPv2 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 241 highlights
NETGEAR 24-Port Gigabit Smart Managed Pro Switch with PoE+ and 2 SFP Ports Model GS724TPv2 8. Configure the following match criteria for the rule: • Sequence Number. Enter a whole number in the range of 1 to 10 that is used to identify the rule. An extended IP ACL can contain up to 10 rules. • Action. Select the ACL forwarding action, which is one of the following: - Permit. Forward packets that meet the ACL criteria. - Deny. Drop packets that meet the ACL criteria. • Egress Queue. If the selection from the Action menu is Permit, select the hardware egress queue identifier that is used to handle all packets matching this IP ACL rule. The range of queue IDs is 0 to 7. • Logging. If the selection form the Action menu is Deny, you can enable logging for the ACL by selecting the Enable radio button. (Logging is subject to resource availability in the device.) If the access list trap flag is also enabled, periodic traps are generated, indicating the number of times this rule was evoked during the report interval. A fixed five-minute report interval is used for the switch. A trap is not issued if the ACL rule hit count is zero for the current interval. • Match Every. From the Match Every menu, select whether all packets must match the selected IP ACL rule: - False. Not all packets need to match the selected IP ACL rule. You can configure other match criteria on the page. - True. All packets must match the selected IP ACL rule and are either permitted or denied. In this case, you cannot configure other match criteria on the page. • Protocol Type. From the menu, select a protocol that a packet's IP protocol must be matched against: IP, ICMP, IGMP, TCP, UDP, EIGRP, GRE, IPINIP, OSPF, PIM, or Other. If you select Other, specify enter a protocol number from 0 to 255. Manage Device Security 241