EasyManuals Logo

Edge-Core ECS3510-52T User Manual

Edge-Core ECS3510-52T
1474 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #358 background imageLoading...
Page #358 background image
C
HAPTER
13
| Security Measures
Access Control Lists
– 358 –
where the equivalent binary bit “1” means to match a bit and “0”
means to ignore a bit. The following bits may be specified:
1 (fin) – Finish
2 (syn) – Synchronize
4 (rst) – Reset
8 (psh) – Push
16 (ack) – Acknowledgement
32 (urg) – Urgent pointer
For example, use the code value and mask below to catch packets with
the following flags set:
SYN flag valid, use control-code 2, control bit mask 2
Both SYN and ACK valid, use control-code 18, control bit mask 18
SYN valid and ACK invalid, use control-code 2, control bit mask 18
Time Range – Name of a time range.
WEB INTERFACE
To add rules to an IPv4 Extended ACL:
1. Click Security, ACL.
2. Select Configure ACL from the Step list.
3. Select Add Rule from the Action list.
4. Select IP Extended from the Type list.
5. Select the name of an ACL from the Name list.
6. Specify the action (i.e., Permit or Deny).
7. Select the address type (Any, Host, or IP).
8. If you select “Host,” enter a specific address. If you select “IP,” enter a
subnet address and the mask for an address range.
9. Set any other required criteria, such as service type, protocol type, or
control code.
10. Click Apply.

Table of Contents

Other manuals for Edge-Core ECS3510-52T

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Edge-Core ECS3510-52T and is the answer not in the manual?

Edge-Core ECS3510-52T Specifications

General IconGeneral
BrandEdge-Core
ModelECS3510-52T
CategoryNetwork Router
LanguageEnglish

Related product manuals