Access List - Extreme Networks ExtremeWare 7.2e Installation And User Manual

Software version 7.2e
Table of Contents

Advertisement

Using ExtremeWare Vista on the Summit 400
Figure 76: VLAN Administration (2 of 2)
The next section allows you to adds ports to the VLAN.
Adding Ports to a VLAN. You can either add the port as tagged or untagged. If you click Tagged, the
port is added as a tag-based port. If you click Untagged, the port is added as an untagged port.
Figure 76 shows an example of adding ports to a VLAN.
The next box allows you to select a port and click Remove to delete the port.

Access List

This window allows you to configure an IP access list, a rate limit, and their associated access masks. IP
access lists, also known as access control lists (ACLs) are used to perform packet filtering and
forwarding decisions on incoming traffic. Each packet arriving on an ingress port is compared to the
access list in sequential order and is either forwarded to a specified QoS profile or dropped.
Each access control list consists of an access mask that selects which fields of each incoming packet to
examine, and a list of values to compare with the values found in the packet. Access masks can be
shared multiple access control lists, using different lists of values to examine packets.
The top section of the window, as shown in Figure 77, displays information about existing access masks.
The following mask features are shown in a table format:
Dest Mac—Ethernet destination MAC address
Src Mac—Ethernet source MAC address
VLAN ID—VLAN identifier (VLANid)
284
ExtremeWare 7.2e Installation and User Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents