Netgear GS724Tv4 Software Administration Manual - Page 219

Source L4 Port Number, Destination L4 Port Number

Page 219 highlights

GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches - Deny. Drops packets which meet the ACL criteria. • Egress Queue. Specify the hardware egress queue identifier used to handle all packets matching this ACL rule. • Match Every. Require a packet to match the criteria of this ACL. Select True or False from the drop-down menu. Match Every is exclusive to the other filtering rules, so if Match Every is True, the other rules on the screen are not available. • Protocol Type. Require a packet's protocol to match the protocol listed here. Select a type from the drop-down menu or enter the protocol number in the available field. • Src IP Address. Require a packet's source IP address to match the address listed here. Type an IP Address in the appropriate field using dotted-decimal notation. The address you enter is compared to a packet's source IP Address. • Src IP Mask. Specify the source IP address wildcard mask. Wild card masks determines which bits are used and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all of the bits are important. Wildcard masking for ACLs operates differently from a subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, you type 0.0.0.255 in the Source IP Mask field. This field is required when you configure a source IP address. • Src L4 Port. Require a packet's TCP/UDP source port to match the port listed here. Click Complete one of the following fields: - Source L4 Keyword. Select the desired L4 keyword from a list of source ports on which the rule can be based. - Source L4 Port Number. If the source L4 keyword is Other, enter a user-defined Port ID by which packets are matched to the rule. • Dst IP Address. Require a packet's destination port IP address to match the address listed here. Enter an IP Address in the appropriate field using dotted-decimal notation. The address you enter is compared to a packet's destination IP Address. • Dst IP Mask. Specify the destination IP address wildcard mask. Wild card masks determines which bits are used and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all of the bits are important. Wildcard masking for ACLs operates differently from a subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, you type 0.0.0.255 in the Source IP Mask field. This field is required when you configure a source IP address. • Dst L4 Port. Require a packet's TCP/UDP destination port to match the port listed here. Complete one of the following fields: - Destination L4 Keyword. Select the desired L4 keyword from a list of destination ports on which the rule can be based. - Destination L4 Port Number. If the destination L4 keyword is Other, enter a user-defined Port ID by which packets are matched to the rule. • Service Type. Select one of the Service Type match conditions for the extended IP ACL rule. The possible values are IP DSCP, IP precedence, and IP TOS, which are Managing Device Security 219

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290

Managing Device Security
219
GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches
-
Deny
. Drops packets which meet the ACL criteria.
Egress Queue
. Specify the hardware egress queue identifier used to handle all
packets matching this ACL rule.
Match Every
. Require a packet to match the criteria of this ACL. Select True or False
from the drop-down menu. Match Every is exclusive to the other filtering rules, so if
Match Every is True, the other rules on the screen are not available.
Protocol Type
. Require a packet’s protocol to match the protocol listed here. Select a
type from the drop-down menu or enter the protocol number in the available field.
Src IP Address
. Require a packet’s source IP address to match the address listed
here. Type an IP Address in the appropriate field using dotted-decimal notation. The
address you enter is compared to a packet’s source IP Address.
Src IP Mask
. Specify the source IP address wildcard mask. Wild card masks
determines which bits are used and which bits are ignored. A wild card mask of
255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that
all of the bits are important. Wildcard masking for ACLs operates differently from a
subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For
example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, you type
0.0.0.255 in the Source IP Mask field. This field is required when you configure a
source IP address.
Src L4 Port
. Require a packet’s TCP/UDP source port to match the port listed here.
Click Complete one of the following fields:
-
Source L4 Keyword
. Select the desired L4 keyword from a list of source ports on
which the rule can be based.
-
Source L4 Port Number
. If the source L4 keyword is Other, enter a user-defined
Port ID by which packets are matched to the rule.
Dst IP Address
. Require a packet’s destination port IP address to match the address
listed here. Enter an IP Address in the appropriate field using dotted-decimal notation.
The address you enter is compared to a packet’s destination IP Address.
Dst IP Mask
. Specify the destination IP address wildcard mask. Wild card masks
determines which bits are used and which bits are ignored. A wild card mask of
255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that
all of the bits are important. Wildcard masking for ACLs operates differently from a
subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For
example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, you type
0.0.0.255 in the Source IP Mask field. This field is required when you configure a
source IP address.
Dst L4 Port
. Require a packet’s TCP/UDP destination port to match the port listed
here. Complete one of the following fields:
-
Destination L4 Keyword
. Select the desired L4 keyword from a list of destination
ports on which the rule can be based.
-
Destination L4 Port Number
. If the destination L4 keyword is Other, enter a
user-defined Port ID by which packets are matched to the rule.
Service Type
. Select one of the Service Type match conditions for the extended IP
ACL rule. The possible values are IP DSCP, IP precedence, and IP TOS, which are