Справочник Пользователя для TP-LINK TL-SG2008

Скачать
Страница из 153
 
110 
 
Figure 10-5 Create Extend-IP Rule 
The following entries are displayed on this screen: 
¾
 
Create Extend-IP ACL 
ACL ID: 
Select the desired Extend-IP ACL for configuration. 
Rule ID: 
Enter the rule ID. 
Operation: 
Select the operation for the switch to process packets which match the 
rules. 
z
 
Permit: Forward packets. 
z
 
Deny: Discard Packets. 
S-IP: 
Enter the source IP address contained in the rule. 
D-IP: 
Enter the destination IP address contained in the rule. 
Mask: 
Enter IP address mask. If it is set to 1, it must strictly match the 
address. 
IP Protocol: 
Select IP protocol contained in the rule. 
S-Port: 
Configure TCP/IP source port contained in the rule when TCP/UDP is 
selected from the pull-down list of IP Protocol. 
D-Port: 
Configure TCP/IP destination port contained in the rule when 
TCP/UDP is selected from the pull-down list of IP Protocol. 
 
10.2 Policy Config   
A Policy is used to control the data packets those match the corresponding ACL rules by 
configuring ACLs and actions together for effect. 
The Policy Config can be implemented on Policy SummaryPolice Create and Action Create 
pages. 
10.2.1  Policy Summary 
On this page, you can view the ACL and the corresponding operations in the policy.