Access Control Lists - Edge-Core ECS4810-12M Layer 2 Management Manual

Hide thumbs Also See for ECS4810-12M Layer 2:
Table of Contents

Advertisement

A
C
L
CCESS
ONTROL
To display or clear the SSH user's public key:
Click Security, SSH.
1.
Select Configure User Key from the Step list.
2.
Select Show from the Action list.
3.
Select a user from the User Name list.
4.
Select the host-key type to clear.
5.
Click Clear.
6.
Figure 188: Showing the SSH User's Public Key
ISTS
Access Control Lists (ACL) provide packet filtering for IPv4/IPv6 frames
(based on address, protocol, Layer 4 protocol port number or TCP control
code), IPv6 frames (based on address, DSCP traffic class, or next header
type), or any frames (based on MAC address or Ethernet type). To filter
incoming packets, first create an access list, add the required rules, and
then bind the list to a specific port.
Configuring Access Control Lists –
An ACL is a sequential list of permit or deny conditions that apply to IP
addresses, MAC addresses, or other more specific criteria. This switch tests
ingress or egress packets against the conditions in an ACL one by one. A
packet will be accepted as soon as it matches a permit rule, or dropped as
soon as it matches a deny rule. If no rules match, the packet is accepted.
– 355 –
| Security Measures
C
13
HAPTER

Access Control Lists

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ecs4810-12m

Table of Contents