Netgear GS724Tv4 Software Administration Manual - Page 217

Src IP Mask, Src IP Address

Page 217 highlights

GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches 5. Select or specify values for one or more of the following match criteria: • Rule ID. Specify a number from 1-50 to identify the IP ACL rule. You can create up to 50 rules for each ACL. • Action. Select the ACL forwarding action, which is one of the following: - Permit. Forward packets which meet the ACL criteria. - Deny. Drop packets which meet the ACL criteria. • Egress Queue. The hardware egress queue identifier used to handle all packets matching this ACL rule. • Logging. When set to Enable, logging is enabled for this ACL rule (subject to resource availability in the device). If the Access List Trap Flag is also enabled, then this causes periodic traps to be generated indicating the number of times this rule was hit during the current report interval. A fixed 5-minute report interval is used for the entire system. A trap is not issued if the ACL rule hit count is zero for the current interval. This field is visible for a Deny action. • Match Every. Require a packet to match the criteria of this ACL. Select True or False from the drop-down list. Match Every is exclusive to the other filtering rules, so if Match Every is True, the other rules on the screen are not available. • Src IP Address. Require a packet's source IP address to match the address listed here. Enter an IP Address in the appropriate field using dotted-decimal notation. The address you enter is compared to a packet's source IP Address. • Src IP Mask. Specify the source IP address wildcard mask. Wild card masks determine which bits are used and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all of the bits are important. Wildcard masking for ACLs operates differently from a subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, enter 0.0.0.255 in the Source IP Mask field. This field is required when you configure a source IP address. 6. Click the Apply button.  To modify the match criteria for an ACL rule: 1. From the ACL Name list on the IP Rules screen, select the ACL that includes the rule to update. 2. In the Basic ACL Rule Table, click the rule ID. The rule ID is a hyperlink to the Standard ACL Rule Configuration screen. 3. Modify the ACL rule information. 4. Click the Apply button.  To delete and IP ACL rule: 1. In the Basic ACL Rule Table on the IP Rules screen, select the check box associated with the rule to remove. 2. Click the Delete button. Managing Device Security 217

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290

Managing Device Security
217
GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches
5.
Select or specify values for one or more of the following match criteria:
Rule ID
. Specify a number from 1–50 to identify the IP ACL rule. You can create up to
50 rules for each ACL.
Action
. Select the ACL forwarding action, which is one of the following:
-
Permit
. Forward packets which meet the ACL criteria.
-
Deny
. Drop packets which meet the ACL criteria.
Egress Queue
. The hardware egress queue identifier used to handle all packets
matching this ACL rule.
Logging
. When set to Enable, logging is enabled for this ACL rule (subject to
resource availability in the device). If the Access List Trap Flag is also enabled, then
this causes periodic traps to be generated indicating the number of times this rule was
hit during the current report interval. A fixed 5-minute report interval is used for the
entire system. A trap is not issued if the ACL rule hit count is zero for the current
interval. This field is visible for a Deny action.
Match Every
. Require a packet to match the criteria of this ACL. Select
True
or
False
from the drop-down list. Match Every is exclusive to the other filtering rules, so if
Match Every is True, the other rules on the screen are not available.
Src IP Address
. Require a packet’s source IP address to match the address listed
here. Enter an IP Address in the appropriate field using dotted-decimal notation. The
address you enter is compared to a packet’s source IP Address.
Src IP Mask
. Specify the source IP address wildcard mask. Wild card masks
determine which bits are used and which bits are ignored. A wild card mask of
255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that
all of the bits are important. Wildcard masking for ACLs operates differently from a
subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For
example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, enter 0.0.0.255 in
the Source IP Mask field. This field is required when you configure a source IP
address.
6.
Click the
Apply
button.
To modify the match criteria for an ACL rule:
1.
From the ACL Name list on the IP Rules screen, select the ACL that includes the rule to
update.
2.
In the Basic ACL Rule Table, click the rule ID.
The rule ID is a hyperlink to the Standard ACL Rule Configuration screen.
3.
Modify the ACL rule information.
4.
Click the
Apply
button.
To delete and IP ACL rule:
1.
In the Basic ACL Rule Table on the IP Rules screen, select the check box associated
with the rule to remove.
2.
Click the
Delete
button.