EasyManuals Logo

Edge-Core ES3510MA User Manual

Edge-Core ES3510MA
984 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #297 background imageLoading...
Page #297 background image
C
HAPTER
14
| Security Measures
Access Control Lists
– 297 –
To display or clear the SSH user’s public key:
1. Click Security, SSH.
2. Select Configure User Key from the Step list.
3. Select Show from the Action list.
4. Select a user from the User Name list.
5. Select the host-key type to clear.
6. Click Clear.
Figure 166: Showing the SSH User’s Public Key
ACCESS CONTROL LISTS
Access Control Lists (ACL) provide packet filtering for IPv4 frames (based
on address, protocol, Layer 4 protocol port number or TCP control code), or
any frames (based on MAC address or Ethernet type). To filter incoming
packets, first create an access list, add the required rules, and then bind
the list to a specific port.
Configuring Access Control Lists –
An ACL is a sequential list of permit or deny conditions that apply to IP
addresses, MAC addresses, or other more specific criteria. This switch tests
ingress packets against the conditions in an ACL one by one. A packet will
be accepted as soon as it matches a permit rule, or dropped as soon as it
matches a deny rule. If no rules match, the packet is accepted.
COMMAND USAGE
The following restrictions apply to ACLs:
â—† The maximum number of ACLs is 64.
â—† The maximum number of rules per system is 512 rules.

Table of Contents

Other manuals for Edge-Core ES3510MA

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Edge-Core ES3510MA and is the answer not in the manual?

Edge-Core ES3510MA Specifications

General IconGeneral
BrandEdge-Core
ModelES3510MA
CategorySwitch
LanguageEnglish

Related product manuals