UMN:CLI User Manual
V8102
20
7.7.20.7 Trust Member Port Count ............................................................................ 217
7.7.20.8 Hold Off Time ............................................................................................... 218
7.7.20.9 Wait-to-Restore Time ................................................................................... 218
7.7.20.10 Displaying Uplink Redundancy Configuration .............................................. 219
7.8 NetBIOS Filtering .............................................................................. 220
7.9 Martian Filtering ................................................................................ 221
7.10 Outband Management Port Security ................................................. 221
7.11 Port Mirroring .................................................................................... 221
7.12 Max Host ........................................................................................... 223
7.12.1 Max New Hosts ........................................................................................ 224
7.13 MAC Table......................................................................................... 225
7.13.1 Admimistered MAC Address .................................................................... 226
7.14 MAC Filtering .................................................................................... 227
7.14.1 Default MAC Filter Policy ......................................................................... 227
7.14.2 Configuring MAC Filter Policy .................................................................. 227
7.14.3 Displaying MAC Filter Policy .................................................................... 228
7.15 ICMP Message Control ..................................................................... 228
7.15.1 Blocking Echo/Bogus Reply Message ..................................................... 229
7.15.2 Interval for Transmit ICMP Message ........................................................ 230
7.15.3 ICMP Destination Unreachable Message ................................................ 231
7.16 TCP Flag Control ............................................................................... 232
7.16.1 RST Configuration .................................................................................... 232
7.16.2 SYN Configuration ................................................................................... 232
7.17 Packet Dump ..................................................................................... 234
7.17.1 Packet Dump by Protocol......................................................................... 234
7.17.2 Packet Dump with Option......................................................................... 234
7.17.3 Debug Packet Dump ................................................................................ 235
7.17.4 Displaying Dump Packets ........................................................................ 236
7.17.5 Dump File ................................................................................................. 236
7.18 Access List ........................................................................................ 237
7.18.1 Standard Access List ................................................................................ 238
7.18.2 Extended Access List ............................................................................... 239
7.18.3 Named Access List ................................................................................... 241
7.18.4 Named Access List for IPv6 address ....................................................... 242
7.18.5 Access List Range ................................................................................... 243
7.18.6 Access List Filter Configuration ............................................................... 243
7.18.6.1 Filters Using Standard IP ACLs .................................................................... 244
7.18.6.2 Filters Using Extended IP ACLs ................................................................... 245
7.18.6.3 Filters Using Extended MAC ACLs .............................................................. 247
7.18.6.4 Applying ACL Filters to Interface .................................................................. 249
7.18.6.5 ACL Logging ................................................................................................ 250
7.18.6.6 Resequencing IP/MAC ACLs ....................................................................... 250
7.18.8 Displaying Access List Entries ................................................................. 251
7.18.9 Access List ZeBos .................................................................................... 252
7.18.9.1 Access List ZeBos for ICMP ........................................................................ 253
7.18.9.2 Access List ZeBos for TCP .......................................................................... 254
7.18.9.3 Access List ZeBos for UDP.......................................................................... 256
7.18.10 IPv6 Access List ZeBos............................................................................ 257