EasyManua.ls Logo

Patton electronics SmartNode Series - Access Control List Configuration

Default Icon
655 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
251
Chapter 24 Access control list configuration
Chapter contents
Introduction........................................................................................................................................................252
About access control lists .....................................................................................................................................252
What access lists do .......................................................................................................................................252
Why you should configure access lists ...........................................................................................................252
When to configure access lists .......................................................................................................................253
Features of access control lists .......................................................................................................................253
Access control list configuration task list..............................................................................................................254
Mapping out the goals of the access control list .............................................................................................254
Creating an access control list profile and enter configuration mode .............................................................255
Adding a filter rule to the current access control list profile ...........................................................................255
Adding an ICMP filter rule to the current access control list profile ..............................................................257
Adding a TCP, UDP or SCTP filter rule to the current access control list profile .........................................259
Binding and unbinding an access control list profile to an IP interface ..........................................................261
Displaying an access control list profile .........................................................................................................262
Debugging an access control list profile .........................................................................................................262
Examples .............................................................................................................................................................264
Denying a specific subnet ..............................................................................................................................264

Table of Contents