Netgear XCM89UP User Manual Software Version 11.x - Page 653
EtherType User Value, Source MAC, Source MAC Mask, Logging, Rate Limit Conform Data Rate
View all Netgear XCM89UP manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 653 highlights
M6100, M5300, and M7100 Series Managed Switches • Reverse ARP • User Value 18. Use EtherType User Value to specify the user defined customized EtherType value to be used when you selected User Value as EtherType key, to compare against an Ethernet frame. Valid range of values is 0x0600 to 0xFFFF. 19. Use Source MAC to specify the source MAC address to compare against an Ethernet frame. Valid format is xx:xx:xx:xx:xx:xx. 20. Use Source MAC Mask to specify the Source MAC address mask specifying which bits in the Source MAC to compare against an Ethernet frame. Valid format is xx:xx:xx:xx:xx:xx. 21. Use VLAN to specify the VLAN ID to compare against an Ethernet frame. Valid range of values is 1 to 4095. Either VLAN range or VLAN can be configured. 22. Use Logging to enable or disable logging. When set to Enable, logging is enabled for this ACL rule (subject to resource availability in the device). If the access list trap flag is also enabled, this causes periodic traps to be generated indicating the number of times this rule was hit during the current report interval. A fixed 5 minute report interval is used for the entire system. A trap is not issued if the ACL rule hit count is zero for the current interval. This field is only supported for a Deny action. 23. Use Rate Limit Conform Data Rate to specify the value of the conforming data rate of MAC ACL rule. Valid values are 1 to 4294967295 in Kbps. 24. Use Rate Limit Burst Size to specify the burst size of MAC ACL rule. Valid values are 1 to 128 in Kbytes. 25. Use Time Range to enter the name of the time range associated with the MAC ACL rule. The Rule Status displays if the ACL rule is active or inactive. If this field is blank, no timer schedules are assigned to the rule. 26. To delete a rule, select the check box associated with the rule and click the Delete button. 27. To change a rule, select the check box associated with the rule and change the desired fields. 28. Click the Apply button. The updated configuration is sent to the switch. Configuration changes take effect immediately. Manage Device Security 653