TP-Link OC200 Omada Controller Software 4.1.5Windows/Linux User Guide - Page 91

to which this ACL applies, From the Destination drop-down list

Page 91 highlights

Chapter 4 Configure the Network with Omada SDN Controller 4. Define packet-filtering criteria of the rule, including protocols, source, and destination, and determine whether to forward the matched packets. Refer to the following table to configure the required parameters and click Apply. Name Status Enter a name to identify the ACL. Click the checkbox to enable the ACL. Policy Protocols Select the action to be taken when a packet matches the rule. Permit: Forward the matched packet. Deny: Discard the matched packet. Select one or more protocol types to which the rule applies from the drop-down list. The default is All, indicating that packets of all protocols will be matched. When you select one of TCP and UDP or both of them, you can set the IP address and port number of a packet as packet-filtering criteria in the rule. From the Source drop-down list, choose one of these options to specify the source of the packets to which this ACL applies: Network Select the network you have created. If no networks have been created, you can select the default network (LAN), or go to Settings > Wired Networks > LAN to create one. The gateway will examine whether the packets are sourced from the selected network. IP Group Select the IP Group you have created. If no IP Groups have been created, click +Create on this page or go to Settings > Profiles > Groups to create one. The gateway will examine whether the source IP address of the packet is in the IP Group. IP-Port Group Select the IP-Port Group you have created. If no IP-Port Groups have been created, click +Create on this page or go to Settings > Profiles > Groups to create one. The gateway will examine whether the source IP address and port number of the packet are in the IP-Port Group. From the Destination drop-down list, choose one of these options to specify the destination of the packets to which this ACL applies: IP Group Select the IP Group you have created. If no IP Groups have been created, click +Create on this page or go to Settings > Profiles > Groups to create one. The gateway will examine whether the destination IP address of the packet is in the IP Group. IP-Port Group Select the IP-Port Group you have created. If no IP-Port Groups have been created, click +Create on this page or go to Settings > Profiles > Groups to create one. The gateway will examine whether the destination IP address and port number of the packet are in the IP-Port Group. You can determine whether the ACL is applied to the packets that are encrypted with IPsec protocols in the Advanced Settings. IPsec packet filtering Select whether to match IPsec packets. Three options are available: Don't Match IPsec Packets, Match Inbound IPsec Packets, Match Inbound Non-IPsec Packets. 89

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333

89
Chapter 4
Configure the Network with Omada SDN Controller
4.
Define packet-filtering criteria of the rule, including protocols, source, and destination, and
determine whether to forward the matched packets. Refer to the following table to configure the
required parameters and click
Apply
.
Name
Enter a name to identify the ACL.
Status
Click the checkbox to enable the ACL.
Policy
Select the action to be taken when a packet matches the rule.
Permit
: Forward the matched packet.
Deny
: Discard the matched packet.
Protocols
Select one or more protocol types to which the rule applies from the drop-down
list. The default is All, indicating that packets of all protocols will be matched. When
you select one of TCP and UDP or both of them, you can set the IP address and port
number of a packet as packet-filtering criteria in the rule.
From the Source drop-down list, choose one of these options to specify the source of the packets
to which this ACL applies:
Network
Select the network you have created. If no networks have been created, you can select
the default network (LAN), or go to
Settings > Wired Networks > LAN
to create one.
The gateway will examine whether the packets are sourced from the selected network.
IP Group
Select the IP Group you have created. If no IP Groups have been created, click
+Create
on this page or go to
Settings > Profiles > Groups
to create one. The gateway will
examine whether the source IP address of the packet is in the IP Group.
IP-Port Group
Select the IP-Port Group you have created. If no IP-Port Groups have been created,
click
+Create
on this page or go to
Settings > Profiles > Groups
to create one. The
gateway will examine whether the source IP address and port number of the packet
are in the IP-Port Group.
From the Destination drop-down list, choose one of these options to specify the destination of the
packets to which this ACL applies:
IP Group
Select the IP Group you have created. If no IP Groups have been created, click
+Create
on this page or go to
Settings > Profiles > Groups
to create one. The gateway will
examine whether the destination IP address of the packet is in the IP Group.
IP-Port Group
Select the IP-Port Group you have created. If no IP-Port Groups have been created,
click
+Create
on this page or go to
Settings > Profiles > Groups
to create one. The
gateway will examine whether the destination IP address and port number of the
packet are in the IP-Port Group.
You can determine whether the ACL is applied to the packets that are encrypted with IPsec
protocols in the Advanced Settings.
IPsec packet filtering
Select whether to match IPsec packets. Three options are available: Don’t Match
IPsec Packets, Match Inbound IPsec Packets, Match Inbound Non-IPsec Packets.