TP-Link T2600G-52TS TL-SG3452 T2600G-52TS V1 User Guide - Page 194

Extend-IP ACL

Page 194 highlights

11.2.5 Extend-IP ACL Extend-IP ACLs analyze and process data packets based on a series of match conditions, which can be the source IP addresses, destination IP addresses, IP protocol and other information of this sort carried in the packets. Choose the menu ACL→ACL Config→Extend-IP ACL to load the following page. Figure 11-8 Create Extend-IP Rule The following entries are displayed on this screen:  Create Extend-IP ACL ACL ID: Select the desired Extend-IP ACL for configuration. Rule ID: Enter the rule ID. Operation: Fragment: Select the operation for the switch to process packets which match the rules.  Permit: Forward packets.  Deny: Discard Packets. Select if the rule will take effect on the fragment packets. When the fragment is selected, this rule will process all the fragments and the last piece of fragment will be always forwarded. S-IP: Enter the source IP address contained in the rule. D-IP: Enter the destination IP address contained in the rule. Mask: Enter IP address mask. If it is set to 1, it must strictly match the address. IP Protocol: Select IP protocol contained in the rule. 184

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278

184
11.2.5 Extend-IP ACL
Extend-IP ACLs analyze and process data packets based on a series of match conditions, which
can be the source IP addresses, destination IP addresses, IP protocol and other information of this
sort carried in the packets.
Choose the menu
ACL
ACL Config
Extend-IP ACL
to load the following page.
Figure 11-8 Create Extend-IP Rule
The following entries are displayed on this screen:
Create Extend-IP ACL
ACL ID:
Select the desired Extend-IP ACL for configuration.
Rule ID:
Enter the rule ID.
Operation:
Select the operation for the switch to process packets which match the
rules.
Permit
: Forward packets.
Deny
: Discard Packets.
Fragment:
Select if the rule will take effect on the fragment packets. When the
fragment is selected, this rule will process all the fragments and the
last piece of fragment will be always forwarded.
S-IP:
Enter the source IP address contained in the rule.
D-IP:
Enter the destination IP address contained in the rule.
Mask:
Enter IP address mask. If it is set to 1, it must strictly match the
address.
IP Protocol:
Select IP protocol contained in the rule.