User Manual
Table Of Contents
- M6100 Web Management User Guide
- Contents
- 1. Getting Started
- 2. Configuring System Information
- 3. Configuring Switching Information
- 4. Routing
- 5. Configuring Quality of Service
- 6. Managing Device Security
- 7. Monitoring the System
- 8. Maintenance
- 9. Help
- A. Default Settings
- B. Configuration Examples
- C. Notification of Compliance
Routing
292
M6100 Web Management User Guide
2. In the Redistribute list, select to Enable or Disable the redistribution for the selected source
protocol.
3. Set the Metric value to be used as the metric of redistributed routes. This fields displays the
metric if the source was preconfigured and can be modified. Valid values are 0 to 16777214.
4. From the Metric Type list, select the OSPF metric type of redistributed routes
5. Set the Tag field in routes redistributed. This field displays the tag if the source was
preconfigured, otherwise the tag is 0 and can be modified. Valid values are 0 to
4294967295.
6. From the Subnets list, select whether the subnetted routes should be redistributed (Enable)
or not (Disable).
7. In the Distribute List field, set the Access List that filters the routes to be redistributed by
the destination protocol. Only permitted routes are redistributed. If this command refers to a
nonexistent access list, all routes are permitted. Valid values for Access List IDs are 1 to
199.
When used for route filtering, the only fields in an access list that get used are:
• Source IP Address and netmask
• Destination IP Address and netmask
• Action (permit or deny)
All other fields (source and destination port, precedence, tos, etc.) are ignored.
The source IP address is compared to the destination IP address of the route. The source
IP netmask in the access list rule is treated as a wildcard mask, indicating which bits in
the source IP address must match the destination address of the route. (Note that a 1 in
the mask indicates a do not care in the corresponding address bit.)
Note: A 1 in the mask indicates a do not care in the corresponding address
bit.
When an access list rule includes a destination IP address and netmask (an extended
access list), the destination IP address is compared to the network mask of the
destination of the route. The destination netmask in the access list serves as a wildcard
mask, indicating which bits in the route's destination mask are significant for the filtering
operation.
8. Click Apply to send the updated configuration to the switch. Configuration changes take
effect immediately.
9. Click Cancel to cancel the configuration on the screen and reset the data on the screen to
the latest value of the switch.
NSF OSPF Summary
Use this screen to see the NSF OSPF Summary. The allowable values for each field are
displayed next to the field. If any invalid values are entered, an alert message is displayed
with the list of all the valid values.










