Netgear XCM89UP Web Management User Guide - Page 484

Action, Logging, Assign Queue ID, Mirror Interface, Redirect Interface, Match Every, Protocol Type

Page 484 highlights

M6100 Web Management User Guide 3. Specify the Action to take if a packet matches the rule's criteria. The choices are Permit or Deny. 4. Set Logging to Enable to enable logging for this ACL rule (subject to resource availability in the device). If the Access List Trap Flag is also enabled, this will cause periodic traps to be generated indicating the number of times this rule was hit during the current report interval. A fixed 5 minute report interval is used for the entire system. A trap is not issued if the ACL rule hit count is zero for the current interval. This field is visible for a Deny Action. 5. In the Assign Queue ID, specify the hardware egress queue identifier used to handle all packets matching this IP ACL rule. The valid range of Queue IDs is 0 to 6. 6. Use the Mirror Interface field to specify the specific egress interface where the matching traffic stream is copied, in addition to being forwarded normally by the device. This field cannot be set if a Redirect Interface is already configured for the ACL rule. This field is visible for a Permit Action. 7. Use the Redirect Interface field to specify the specific egress interface where the matching traffic stream is forced, bypassing any forwarding decision normally performed by the device. This field cannot be set if a Mirror Interface is already configured for the ACL rule. This field is enabled for a Permit Action. 8. Select True or False from the Match Every menu. True signifies that all packets will match the selected IP ACL and Rule and will be either permitted or denied. In this case, since all packets match the rule, the option of configuring other match criteria will not be offered. To configure specific match criteria for the rule, remove the rule and re-create it, or re-configure Match Every to False for the other match criteria to be visible. 9. Use the Protocol Type field to specify that a packet's IP protocol is a match condition for the selected IP ACL rule. The possible values are ICMP, IGMP, IP, TCP, UDP, EIGRP, GRE, IPINIP, OSPF, and PIM. 10. In the TCP Flag field, specify that a packet's TCP flag is a match condition for the selected IP ACL rule. The TCP flag values are URG, ACK, PSH, RST, SYN, and FIN. Each TCP flag has the possible values below and can be set separately: • Ignore-A packet matches this ACL rule whether the TCP flag in this packet is set or not. • Set (+)-A packet matches this ACL rule if the TCP flag in this packet is set. • Clear(-)-A packet matches this ACL rule if the TCP flag in this packet is not set. 11. When Established is specified, a match occurs if either RST- or ACK-specified bits are set in the TCP header. These fields are enabled only when TCP protocol is selected. 12. In the Src field, enter a source IP Address, using dotted-decimal notation, to be compared to a packet's source IP Address as a match criteria for the selected IP ACL rule. a. Select the IP Address option and enter an IP address with a relevant wild card mask to apply this criteria. If this field is left empty, it means any. b. When you select the Host option, the wild card mask is configured as 0.0.0.0. If this field is left empty, it means any. The wild card mask determines which bits are used and which bits are ignored. A wild card mask of 0.0.0.0 indicates that none of the bits are important. A wild card of 255.255.255.255 indicates that all of the bits are important. Managing Device Security 484

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561
  • 562
  • 563
  • 564

Managing Device Security
484
M6100 Web Management User Guide
3.
Specify the
Action
to take if a packet matches the rule's criteria. The choices are Permit or
Deny.
4.
Set
Logging
to Enable to enable logging for this ACL rule (subject to resource availability in
the device). If the Access List Trap Flag is also enabled, this will cause periodic traps to be
generated indicating the number of times this rule was
hit
during the current report interval.
A fixed 5 minute report interval is used for the entire system. A trap is not issued if the ACL
rule hit count is zero for the current interval. This field is visible for a
Deny
Action.
5.
In the
Assign Queue ID,
specify the hardware egress queue identifier used to handle all
packets matching this IP ACL rule. The valid range of Queue IDs is 0 to 6.
6.
Use the
Mirror Interface
field to specify the specific egress interface where the matching
traffic stream is copied, in addition to being forwarded normally by the device. This field
cannot be set if a Redirect Interface is already configured for the ACL rule. This field is
visible for a
Permit
Action.
7.
Use the
Redirect Interface
field to specify the specific egress interface where the matching
traffic stream is forced, bypassing any forwarding decision normally performed by the device.
This field cannot be set if a Mirror Interface is already configured for the ACL rule. This field
is enabled for a
Permit
Action.
8.
Select True or False from the
Match Every
menu. True signifies that all packets will match
the selected IP ACL and Rule and will be either permitted or denied. In this case, since all
packets match the rule, the option of configuring other match criteria will not be offered. To
configure specific match criteria for the rule, remove the rule and re-create it, or re-configure
Match Every
to False for the other match criteria to be visible.
9.
Use the
Protocol Type
field to specify that a packet's IP protocol is a match condition for the
selected IP ACL rule. The possible values are ICMP, IGMP, IP, TCP, UDP, EIGRP, GRE,
IPINIP, OSPF, and PIM.
10.
In the
TCP Flag
field, specify that a packet's TCP flag is a match condition for the selected
IP ACL rule. The TCP flag values are URG, ACK, PSH, RST, SYN, and FIN. Each TCP flag
has the possible values below and can be set separately:
Ignore
A packet matches this ACL rule whether the TCP flag in this packet is set or
not.
Set (+)
A packet matches this ACL rule if the TCP flag in this packet is set.
Clear(-)
A packet matches this ACL rule if the TCP flag in this packet is not set.
11.
When
Established
is specified, a match occurs if either RST- or ACK-specified bits are set
in the TCP header. These fields are enabled only when TCP protocol is selected.
12.
In the
Src
field, enter a source IP Address, using dotted-decimal notation, to be compared to
a packet's source IP Address as a match criteria for the selected IP ACL rule.
a.
Select the
IP Address
option and enter an IP address with a relevant wild card mask
to apply this criteria. If this field is left empty, it means
any
.
b.
When you select the
Host
option, the wild card mask is configured as 0.0.0.0. If this
field is left empty, it means
any
.
The wild card mask determines which bits are used and which bits are ignored. A wild
card mask of 0.0.0.0 indicates that
none
of the bits are important. A wild card of
255.255.255.255 indicates that
all
of the bits are important.