Netgear GS728TPP GS728TP/GS728TPP/GS752TP Software Administration Manual - Page 194

MAC Binding Configuration, EtherType User Value

Page 194 highlights

GS752TP, GS728TP, and GS728TPP Gigabit Smart Switches • EtherType Key. Requires a packet's EtherType to match the EtherType you select. Select the EtherType value from the drop-down list. If you select User Value, you can enter a custom EtherType value. • EtherType User Value. This field is configurable if you select User Value from the EtherType drop-down list. The value you enter specifies a customized EtherType to compare against an Ethernet frame. The valid range is 0x0600-0xFFFF. • Source MAC. Requires a packet's source port MAC address to match the address listed here. Enter a MAC address in this field. The valid format is xx:xx:xx:xx:xx:xx. • Source MAC Mask. If desired, enter the MAC mask for the source MAC address to match. Use Fs and 0s in the MAC mask, which is in a wildcard format. An F means that the bit is not checked, and a 0 in a bit position means that the data must equal the value given for that bit. The valid format is xx:xx:xx:xx:xx:xx. A MAC mask of 00:00:00:00:00:00 matches a single MAC address. • VLAN. Requires a packet's VLAN ID to match the ID listed here. Enter the VLAN ID to apply this criteria. The valid range is 1-4093. • Logging. Enables or disables logging of management access list (ACL) deny events. 5. Click ADD. To change a rule, select the check box associated with the rule, change the desired fields, and click APPLY. MAC Binding Configuration When an ACL is bound to an interface, all the rules that have been defined are applied to the selected interface. Use the MAC Binding Configuration screen to assign MAC ACL lists to ACL priorities and interfaces.  To configure MAC ACL interface bindings: 1. Select Security  ACL > Basic  MAC Binding Configuration. Managing Device Security 194

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275

Managing Device Security
194
GS752TP, GS728TP, and GS728TPP Gigabit Smart Switches
EtherType Key
. Requires a packet’s EtherType to match the EtherType you select.
Select the EtherType value from the drop-down list. If you select User Value, you can
enter a custom EtherType value.
EtherType User Value
. This field is configurable if you select User Value from the
EtherType drop-down list. The value you enter specifies a customized EtherType to
compare against an Ethernet frame. The valid range is 0x0600–0xFFFF.
Source MAC
. Requires a packet’s source port MAC address to match the address
listed here. Enter a MAC address in this field. The valid format is xx:xx:xx:xx:xx:xx.
Source MAC Mask
. If desired, enter the MAC mask for the source MAC address to
match. Use Fs and 0s in the MAC mask, which is in a wildcard format. An F means
that the bit is not checked, and a 0 in a bit position means that the data must equal the
value given for that bit. The valid format is xx:xx:xx:xx:xx:xx. A MAC mask of
00:00:00:00:00:00 matches a single MAC address.
VLAN
. Requires a packet’s VLAN ID to match the ID listed here. Enter the VLAN ID to
apply this criteria. The valid range is 1–4093.
Logging
. Enables or disables logging of management access list (ACL) deny events.
5.
Click
ADD
.
To change a rule, select the check box associated with the rule, change the desired fields,
and click
APPLY
.
MAC Binding Configuration
When an ACL is bound to an interface, all the rules that have been defined are applied to the
selected interface. Use the MAC Binding Configuration screen to assign MAC ACL lists to
ACL priorities and interfaces.
To configure MAC ACL interface bindings:
1.
Select
Security
ACL
>
Basic
MAC Binding Configuration
.