Netgear GS752TPS(B) - ProSAFE 48-Port Gigabit Stackable Smart Switch with PoE and 4 SFP uplinks Guia Do Programa

Página de 329
245
 GS728TS, GS728TPS, GS752TS, and GS752TPS Gigabit Smart Switches
•     
Match Every. Requires a packet to match the criteria of this ACL. Select True or 
False from the drop down menu. Match Every is exclusive to the other filtering rules, 
so if Match Every is True, the other rules on the screen are not available.
•     
Source IP Address. Requires a packet’s source IP address to match the address 
listed here. Type an IP Address in the appropriate field using dotted-decimal notation. 
The address you enter is compared to a packet's source IP Address. 
•     
Source IP Mask. Specifies the source IP address wildcard mask. Wild card masks 
determines which bits are used and which bits are ignored. A wild card mask of 
255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that 
all of the bits are important. Wildcard masking for ACLs operates differently from a 
subnet mask. A wildcard mask is in essence the inverse of a subnet mask. For 
example, to apply the rule to all hosts in the 192.168.1.0/24 subnet, you type 
0.0.0.255 in the Source IP Mask field. This field is required when you configure a 
source IP address.
3. 
To delete an IP ACL rule, select the check box associated with the rule, and then click 
Delete.
4. 
To update an IP ACL rule, select the check box associated with the rule, update the desired 
fields, and then click Apply. You cannot modify the Rule ID of an existing IP rule.
5. 
Click Cancel to cancel the configuration on the screen and reset the data on the screen to 
the latest value of the switch.
6. 
If you change any of the settings on the page, click Apply to send the updated configuration 
to the switch. Configuration changes take effect immediately.
IP Extended Rule
Use the IP Extended Rules page to define rules for IP-based extended ACLs. The access list 
definition includes rules that specify whether traffic matching the criteria is forwarded 
normally or discarded.
Note:  
There is an implicit “deny all” rule at the end of an ACL list. This 
means that if an ACL is applied to a packet and if none of the explicit 
rules match, then the final implicit “deny all” rule applies and the 
packet is dropped.
To display the IP extended Rules page, click Security > ACL > Advanced > IP Extended 
Rules.