EasyManua.ls Logo

3Com 3CRWX120695A - Page 349

3Com 3CRWX120695A
570 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Using Access Control Lists for Security 349
5 In the ACL Name box, type the name for the ACL (1 to 32 alphanumeric
characters, with no spaces or tabs). The name can include hyphens (-),
underscores (_), or periods (.). ACL names are case-sensitive and must
begin with a letter. Do not include any of the following terms in the
name: all, default-action, map, help, editbuffer.
6 Go to “Defining Access Control Entries”.
Defining Access Control Entries
As part of defining ACL properties, you need to define access control
entries (ACEs) for the ACL. You can add the following types of ACEs to an
ACL:
IP — Filters packets by source and destination IP addresses, type of
service (TOS), or precedence. For more information, see “Creating an
IP ACE” on page 350.
TCP — Filters packets by established TCP connections, source and
destination IP addresses, TOS, precedence, or TCP source and
destination ports. For more information, see “Creating a TCP or UDP
ACE” on page 352.

Table of Contents

Other manuals for 3Com 3CRWX120695A

Related product manuals