Netgear GS728TXS GS728TXS/GS752TXS Software Administration Manual - Page 233

IP Extended Rules, Permit, Egress Queue, Logging, Match Every, Src IP Address, Src IP Mask, Apply

Page 233 highlights

GS752TXS and GS728TXS Smart Switches - Permit. Forwards packets which meet the ACL criteria. - Deny. Drops packets which meet the ACL criteria. • Egress Queue. Specifies the hardware egress queue identifier used to handle all packets matching this ACL rule. • Logging. When set to Enable, logging is enabled for this ACL rule (subject to resource availability in the device). If the Access List Trap Flag is also enabled, then this causes periodic traps to be generated indicating the number of times this rule was hit during the current report interval. A fixed 5-minute report interval is used for the entire system. A trap is not issued if the ACL rule hit count is zero for the current interval. This field is visible for a Deny action. • Match Every. Requires a packet to match the criteria of this ACL. Select True or False from the drop-down menu. Match Every is exclusive to the other filtering rules, so if Match Every is True, the other rules on the screen are not available. • Src IP Address. Requires a packet's source IP address to match the address listed here. Enter an IP Address in the appropriate field using dotted-decimal notation. The address you enter is compared to a packet's source IP Address. • Src IP Mask. Specifies the source IP address wildcard mask. Wild card masks determine which bits are used and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all of the bits are important. Wildcard masking for ACLs operates differently from a subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, enter 0.0.0.255 in the Source IP Mask field. This field is required when you configure a source IP address. 6. Click Apply.  To modify the match criteria for an ACL rule: 1. From the ACL Name list on the IP Rules screen, select the ACL that includes the rule to update. 2. In the Basic ACL Rule Table, click the rule ID. The rule ID is a hyperlink to the Standard ACL Rule Configuration screen. 3. Modify the ACL rule information. 4. Click Apply.  To delete and IP ACL rule: 1. In the Basic ACL Rule Table on the IP Rules screen, select the check box associated with the rule to remove. 2. Click Delete. IP Extended Rules Use the IP Extended Rules screen to define rules for IP-based extended ACLs. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. 233

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324

233
GS752TXS and GS728TXS Smart Switches
-
Permit
. Forwards packets which meet the ACL criteria.
-
Deny
. Drops packets which meet the ACL criteria.
Egress Queue
. Specifies the hardware egress queue identifier used to handle all
packets matching this ACL rule.
Logging
. When set to Enable, logging is enabled for this ACL rule (subject to
resource availability in the device). If the Access List Trap Flag is also enabled, then
this causes periodic traps to be generated indicating the number of times this rule was
hit during the current report interval. A fixed 5-minute report interval is used for the
entire system. A trap is not issued if the ACL rule hit count is zero for the current
interval. This field is visible for a Deny action.
Match Every
. Requires a packet to match the criteria of this ACL. Select True or
False from the drop-down menu. Match Every is exclusive to the other filtering rules,
so if Match Every is True, the other rules on the screen are not available.
Src IP Address
. Requires a packet’s source IP address to match the address listed
here. Enter an IP Address in the appropriate field using dotted-decimal notation. The
address you enter is compared to a packet's source IP Address.
Src IP Mask
. Specifies the source IP address wildcard mask. Wild card masks
determine which bits are used and which bits are ignored. A wild card mask of
255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that
all of the bits are important. Wildcard masking for ACLs operates differently from a
subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For
example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, enter 0.0.0.255 in
the Source IP Mask field. This field is required when you configure a source IP
address.
6.
Click
Apply
.
To modify the match criteria for an ACL rule:
1.
From the ACL Name list on the IP Rules screen, select the ACL that includes the rule to
update.
2.
In the Basic ACL Rule Table, click the rule ID.
The rule ID is a hyperlink to the Standard ACL Rule Configuration screen.
3.
Modify the ACL rule information.
4.
Click
Apply
.
To delete and IP ACL rule:
1.
In the Basic ACL Rule Table on the IP Rules screen, select the check box associated with
the rule to remove.
2.
Click
Delete
.
IP Extended Rules
Use the IP Extended Rules
screen to define rules for IP-based extended ACLs. The access
list definition includes rules that specify whether traffic matching the criteria is forwarded
normally or discarded.