Netgear GS748Tv5 Software Administration Manual - Page 211

MAC Rules, To delete a MAC ACL

Page 211 highlights

GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches  To delete a MAC ACL: 1. Select the check box next to the Name field. 2. Click the Delete button. MAC Rules Use the MAC Rules screen to define rules for MAC-based ACLs. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. A default deny all rule is the last rule of every list. Note: To create a new MAC ACL, use the MAC ACL screen.  To add rules to a MAC ACL: 1. Select Security > ACL > Basic > MAC Rules. 2. From the ACL Name list, select the MAC ACL for which to create or update a rule. 3. In the Rule ID field, specify ID for the rule. 4. Configure the ACL rule criteria by selecting options or specifying values as follows: • Action. Specify what action should be taken if a packet matches the rule's criteria: - Permit. Forwards packets that meet the ACL criteria. - Deny. Drops packets that meet the ACL criteria. • Assign Queue. Specifies the hardware egress queue identifier used to handle all packets matching this ACL rule. Enter an identifying number from 0-7 in this field. • Redirect Interface. Specifies the specific egress interface where the matching traffic stream is forced, bypassing any forwarding decision normally performed by the device. • Match Every. Requires a packet to match the criteria of this ACL. Select True or False from the drop-down menu. Match Every is exclusive to the other filtering rules, so if Match Every is True, the other rules on the screen are not available. • CoS. Requires a packet's class of service (CoS) to match the CoS value listed here. Enter a CoS value between 0-7 to apply this criteria. • Destination MAC. Requires an Ethernet frame's destination port MAC address to match the address listed here. Enter a MAC address in this field. The valid format is xx:xx:xx:xx:xx:xx. • Destination MAC Mask. If desired, enter the MAC Mask associated with the Destination MAC to match. The MAC address mask specifies which bits in the destination MAC to compare against an Ethernet frame. Use Fs and zeros in the MAC mask, which is in a wildcard format. An F means that the bit is not checked, and a zero in a bit position means that the data must equal the value given for that bit. For example, if the MAC address is aa:bb:cc:dd:ee:ff, and the mask is 00:00:ff:ff:ff:ff, all Managing Device Security 211

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290

Managing Device Security
211
GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches
To delete a MAC ACL:
1.
Select the check box next to the Name field.
2.
Click the
Delete
button.
MAC Rules
Use the MAC Rules screen to define rules for MAC-based ACLs. The access list definition
includes rules that specify whether traffic matching the criteria is forwarded normally or
discarded. A default
deny all
rule is the last rule of every list.
Note:
To create a new MAC ACL, use the
MAC ACL
screen.
To add rules to a MAC ACL:
1.
Select
Security
>
ACL
>
Basic
>
MAC Rules
.
2.
From the ACL Name list, select the MAC ACL for which to create or update a rule.
3.
In the Rule ID field, specify ID for the rule.
4.
Configure the ACL rule criteria by selecting options or specifying values as follows:
Action
. Specify what action should be taken if a packet matches the rule’s criteria:
-
Permit
. Forwards packets that meet the ACL criteria.
-
Deny
. Drops packets that meet the ACL criteria.
Assign Queue
. Specifies the hardware egress queue identifier used to handle all
packets matching this ACL rule. Enter an identifying number from 0–7 in this field.
Redirect Interface
. Specifies the specific egress interface where the matching traffic
stream is forced, bypassing any forwarding decision normally performed by the
device.
Match Every
. Requires a packet to match the criteria of this ACL. Select True or
False from the drop-down menu. Match Every is exclusive to the other filtering rules,
so if Match Every is True, the other rules on the screen are not available.
CoS
. Requires a packet’s class of service (CoS) to match the CoS value listed here.
Enter a CoS value between 0–7 to apply this criteria.
Destination MAC
. Requires an Ethernet frame’s destination port MAC address to
match the address listed here. Enter a MAC address in this field. The valid format is
xx:xx:xx:xx:xx:xx.
Destination MAC Mask
. If desired, enter the MAC Mask associated with the
Destination MAC to match. The MAC address mask specifies which bits in the
destination MAC to compare against an Ethernet frame. Use Fs and zeros in the MAC
mask, which is in a wildcard format. An F means that the bit is not checked, and a
zero in a bit position means that the data must equal the value given for that bit. For
example, if the MAC address is aa:bb:cc:dd:ee:ff, and the mask is 00:00:ff:ff:ff:ff, all