EasyManua.ls Logo

SMC Networks TigerSwitch

Default Icon
518 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
A
CCESS
C
ONTROL
L
ISTS
3-83
For example, use the code value and mask below to catch packets with
the following flags set:
- SYN flag valid, use control-code 2, control bitmask 2
- Both SYN and ACK valid, use control-code 18, control bitmask
18
- SYN valid and ACK invalid, use control-code 2, control bitmask
18
Web – Specify the action (i.e., Permit or Deny). Specify the source and/or
destination addresses. Select the address type (Any, Host, or IP). If you
select “Host,” enter a specific address. If you select “IP,” enter a subnet
address and the mask for an address range. Set any other required criteria,
such as service type, protocol type, or TCP control code. Then click Add.
Figure 3-37 ACL Configuration - Extended IP
CLI – This example adds two rules:
1. Accept any incoming packets if the source address is in subnet 10.7.1.x.
For example, if the rule is matched; i.e., the rule (10.7.1.0 &
255.255.255.0) equals the masked address (10.7.1.2 & 255.255.255.0),
the packet passes through.
2. Allow TCP packets from class C addresses 192.168.1.0 to any
destination address when set for destination TCP port 80 (i.e., HTTP).

Table of Contents

Related product manuals