EasyManua.ls Logo

LEGRAND PDU - Page 338

LEGRAND PDU
505 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
June 2018
338 Legrand PDU User Guide
config:# security ipAccessControl ipv4 enabled true defaultPolicyIn accept
defaultPolicyOut accept
Results:
The IPv4 access control feature is enabled.
The default policy for inbound traffic is set to "accept."
The default policy for outbound traffic is set to "accept."
Example 2 - Adding an IPv4 Firewall Rule
The following command adds a new IPv4 access control rule and specifies its location in the list.
config:# security ipAccessControl ipv4 rule add 192.168.84.123/24 accept
insertAbove 5
Results:
A new IPv4 firewall control rule is added to accept all packets sent from the IPv4 address
192.168.84.123.
The newly-added rule is inserted above the 5th rule. That is, the new rule becomes the 5th rule, and the
original 5th rule becomes the 6th rule.
Example 3 - User Blocking
The following command sets up two user blocking parameters.
config:# security userBlocking maximumNumberOfFailedLogins 5 blockTime 30
Results:
The maximum number of failed logins is set to 5.
The user blocking time is set to 30 minutes.
Example 4 - Adding an IPv4 Role-based Access Control Rule
The following command creates a newIPv4 role-based access control rule and specifies its location in the
list.
config:# security roleBasedAccessControl ipv4 rule add 192.168.78.50 192
.
168.90.100
admin deny insertAbove 3
Results:
A new IPv4 role-based access control rule is added, dropping all packets from any IPv4 address
between 192.168.78.50 and 192.168.90.100 when the user is a member of the role "admin."
The newly-added IPv4 rule is inserted above the 3rd rule. That is, the new rule becomes the 3rd rule,
and the original 3rd rule becomes the 4th rule.

Table of Contents

Related product manuals