Netgear GS748Tv4 GS748Tv4 Software Administration Manual - Page 182

MAC ACL, Select Devices Based on TCP/UDP Destination Port ID

Page 182 highlights

GS748T Smart Switch Software Administration Manual When a packet meets the match criteria of a rule, the specified rule action (Permit or Deny) is taken and the additional rules are not checked for a match; configure as follows: • Select Devices Based on Source MAC Address. Permit and Deny options are used to configure devices based on source MAC address. • Select Devices Based on Destination MAC Address. Permit and Deny options are used to configure devices based on destination MAC address. • Select Devices Based on Source IP Address. Permit and Deny options are used to configure devices based on source IP address. • Select Devices Based on Destination IP Address. Permit and Deny options are used to configure devices based on destination IP address. • Select Devices Based on TCP/UDP Source Port ID. Permit and Deny options are used to configure devices based on TCP/UDP source port ID. • Select Devices Based on TCP/UDP Destination Port ID. Permit and Deny options are used to configure devices based on TCP/UDP destination port ID. MAC ACL A MAC ACL consists of a set of rules which are matched sequentially against a packet. When a packet meets the match criteria of a rule, the specified rule action (Permit/Deny) is taken and the additional rules are not checked for a match. There are multiple steps involved in defining a MAC ACL and applying it to the switch: 1. Use the MAC ACL page to create the ACL ID. 2. Use the MAC Rules page to create rules for the ACL. 3. Use the MAC Binding Configuration page to assign the ACL by its ID number to a port. 4. Optionally, use the MAC Binding Table page to view the configurations. 182 | Chapter 5: Managing Device Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273

182
|
Chapter 5:
Managing Device Security
GS748T Smart Switch Software Administration Manual
When a packet meets the match criteria of a rule, the specified rule action (Permit or Deny) is
taken and the additional rules are not checked for a match; configure as follows:
Select Devices Based on Source MAC Address
. Permit and Deny options are used to
configure devices based on source MAC address.
Select Devices Based on Destination MAC Address
. Permit and Deny options are used
to configure devices based on destination MAC address.
Select Devices Based on Source IP Address
. Permit and Deny options are used to
configure devices based on source IP address.
Select Devices Based on Destination IP Address
. Permit and Deny options are used to
configure devices based on destination IP address.
Select Devices Based on TCP/UDP Source Port ID
. Permit and Deny options are used to
configure devices based on TCP/UDP source port ID.
Select Devices Based on TCP/UDP Destination Port ID
. Permit and Deny options are
used to configure devices based on TCP/UDP destination port ID.
MAC ACL
A MAC ACL consists of a set of rules which are matched sequentially against a packet. When
a packet meets the match criteria of a rule, the specified rule action (Permit/Deny) is taken
and the additional rules are not checked for a match.
There are multiple steps involved in defining a MAC ACL and applying it to the switch:
1.
Use the
MAC ACL
page to create the ACL ID.
2.
Use the
MAC Rules
page to create rules for the ACL.
3.
Use the
MAC Binding Configuration
page to assign the ACL by its ID number to a port.
4.
Optionally, use the
MAC Binding Table
page to view the configurations.