Netgear GS752TP GS728TP/GS728TPP/GS752TP Software Administration Manual - Page 199
IP Extended Rules, Logging, Match Every, Src IP Address, Src IP Mask, APPLY
View all Netgear GS752TP manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 199 highlights
GS752TP, GS728TP, and GS728TPP Gigabit Smart Switches • Logging. When set to Enable, logging is enabled for this ACL rule (subject to resource availability in the device). If the access list trap flag is also enabled, this causes periodic traps to be generated indicating the number of times this rule was hit during the current report interval. A fixed 5-minute report interval is used for the entire system. A trap is not issued if the ACL rule hit count is 0 for the current interval. This field is available for a deny action. • Match Every. Requires a packet to match the criteria of this ACL. Select Enable or Disable. Match Every is exclusive to the other filtering rules, so if Match Every is enabled, the other rules on the screen are not available. • Src IP Address. Requires a packet's source IP address to match the address listed here. Enter an IP address using dotted-decimal notation. The address you enter is compared to a packet's source IP address. • Src IP Mask. Specifies the source IP address wildcard mask. Wildcard masks determine which bits are used and which bits are ignored. A wildcard mask of 255.255.255.255 indicates that no bit is important. A wildcard mask of 0.0.0.0 indicates that all of the bits are important. Wildcard masking for ACLs operates differently from a subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, enter 0.0.0.255 in the Source IP Mask field. This field is required when you configure a source IP address. 4. Click ADD. Configuration changes take effect immediately. To update an IP ACL rule, select the check box associated with the rule, update the desired fields, and click APPLY. You cannot modify the Rule ID of an existing IP rule. IP Extended Rules Use the IP Extended Rules screen to define rules for IP-based extended ACLs. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. Note: There is an implicit "deny all" rule at the end of an ACL list. This rule means that if an ACL is applied to a packet and if none of the explicit rules match, the final implicit "deny all" rule applies and the packet is dropped. To configure rules for an IP ACL: 1. Click Security ACL > Advanced IP Extended Rules. Managing Device Security 199