Netgear GS510TP – ProSAFE 8-Port Gigabit Smart Switch with PoE and 2 fiber SFP ports 관리자 가이드
![Netgear](https://files.manualsbrain.com/attachments/cf1ad5de25a3f8d6c88ef0ab489c1b137eebe11f/common/fit/150/50/17742d1e0cdacf24edeb88c30757620088415c5f7699f69b4517262e21e0/brand_logo.jpeg)
Managing Device Security
173
GS510TP and GS110T Gigabit Smart Switches
255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that
all of the bits are important. Wildcard masking for ACLs operates differently from a
subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For
example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, you type
0.0.0.255 in the Source IP Mask field. This field is required when you configure a
source IP address.
all of the bits are important. Wildcard masking for ACLs operates differently from a
subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For
example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, you type
0.0.0.255 in the Source IP Mask field. This field is required when you configure a
source IP address.
2.
To delete an IP ACL rule, select the check box associated with the rule, and then click
Delete.
3.
To update an IP ACL rule, select the check box associated with the rule, update the desired
fields, and then click Apply. You cannot modify the Rule ID of an existing IP rule.
4.
Click Cancel to cancel the configuration on the screen and reset the data on the screen to
the latest value of the switch.
5.
If you change any of the settings on the page, click Apply to send the updated configuration
to the switch. Configuration changes take effect immediately.
IP Extended Rule
Use the IP Extended Rules page to define rules for IP-based extended ACLs. The access list
definition includes rules that specify whether traffic matching the criteria is forwarded
normally or discarded.
definition includes rules that specify whether traffic matching the criteria is forwarded
normally or discarded.
Note:
There is an implicit “deny all” rule at the end of an ACL list. This
means that if an ACL is applied to a packet and if none of the explicit
rules match, then the final implicit “deny all” rule applies and the
packet is dropped.
rules match, then the final implicit “deny all” rule applies and the
packet is dropped.
To display the IP extended Rules page, click Security > ACL, then click the Advanced > IP
Extended Rules link.
Extended Rules link.