Operation Manual
Table Of Contents
- Package Contents
- Chapter 1 About This Guide
- Chapter 2 Introduction
- Chapter 3 Login to the Switch
- Chapter 4 System
- Chapter 5 Switching
- Chapter 6 VLAN
- Chapter 7 Spanning Tree
- Chapter 8 Ethernet OAM
- Chapter 9 DHCP
- Chapter 10 Multicast
- Chapter 11 QoS
- Chapter 12 ACL
- Chapter 13 Network Security
- Chapter 14 SNMP
- Chapter 15 LLDP
- Chapter 16 Cluster
- Chapter 17 Maintenance
- Chapter 18 System Maintenance via FTP
- Appendix A: Glossary
209
The following entries are displayed on this screen:
Create Extend-IP Rule
ACL ID:
Select the desired Extend-IP ACL for configuration.
Rule ID:
Enter the rule ID.
Operation:
Select the operation for the switch to process packets which match
the rules.
Permit: Forward packets.
Deny: Discard Packets.
Fragment: Select if the rule will take effect on the fragment packets. When th
e
fragment is selected, this rule will process all the fragments and the
last piece of fragment will be always forwarded.
S-IP:
Enter the source IP address contained in the rule.
D-IP:
Enter the destination IP address contained in the rule.
Mask: Enter
IP address mask. If it is set to 1, it must strictly match the
address.
IP Protocol:
Select IP protocol contained in the rule.
Select ICMP:
Configure the predefined ICMP type and code.
ICMP Type:
Configure the predefined ICMP type
ICMP Code:
Configure the predefined ICMP code.
TCP Flag
:
Configure TCP flag when TCP is selected from the pull-
down list of IP
Protocol.
S-Port: Configure TCP/IP source port contained in the rule when TCP/UDP is
selected from the pull-down list of IP Protocol.
D-Port: Conf
igure TCP/IP destination port contained in the rule when
TCP/UDP is selected from the pull-down list of IP Protocol.
DSCP:
Enter the DSCP information contained in the rule.
IP ToS:
Enter the IP-ToS contained in the rule.
IP Pre:
Enter the IP Precedence contained in the rule.
Time-Range:
Select the time-range for the rule to take effect.
12.2.6 Combined ACL
Combined ACLs analyze and process data packets based on a series of match conditions,
which can be the source MAC addresses, destination MAC addresses source IP addresses,
destination IP addresses and other information of this sort carried in the packets.
On this page you can create Combined ACL rules.