D-Link DI-1750 Reference Manual page 202

Hide thumbs Also See for DI-1750:
Table of Contents

Advertisement

(01)standard
Standard Access List
Please Input the code of command to be excute(0-1): 0
input 0,Select extended option ,prompt is as below:
(00)WORD
Extended Access-list name
Please Input the code of command to be excute(0-0): 0
input 0,Select WORD option ,prompt is as below:
Please input a string:word (input extend access list string)
Step2:
Key Word:
Q(quit)
(00)chinese help message in Chinese
(01)chmem Change memory of system
(02)connect Open a outgoing connection
(03)default restore default configuration
(04)deny Specify packets to reject
(05)disconnect Discoonect an existing outgoing network connection
......
Please Input the code of command to be excute(0-18):4 (Select deny option )
If you Select permit Command, you can specify one or more allowance terms.
Key Word:
U(undo) D(default) Q(quit)
(00)<0-255> An IP protocol number
(01)icmp Internet Control Message Protocol
(02)igmp Internet Gateway Message Protocol
(03)ip Internet Protocol
(04)ospf OSPF routing protocol
(05)tcp Transmission Control Protocol
(06)udp User Datagram Protocol
Please Input the code of command to be excute(0-6):3( Select corresponding protocol)
Step3:
Key Word:
Q(quit)
(00)A.B.C.D Address to match
(01)any Any source host
Please Input the code of command to be excute(0-1): 0
Please input a IP Address:192.168.1.2
Key Word:
Q(quit)
(00)A.B.C.D IP subnet mask
Please Input the code of command to be excute(0-0):0
Please input a IP Address:255.255.255.0
In the prompt input Q or q, exit from access list configuration.
After you initially create an access list, you place any subsequent additions (possibly entered from the
terminal) at the end of the list. In other words, you cannot select ively add access list command lines to
a specific access list. However, you can use permit(undo) and deny(undo) commands to remove
entries from a named access list.
Note:
When making the standard and extended access list, remember that, by default, the end of the access list contains an
implicit deny statement for everything if it did not find a match before reaching the end. Further, with standard access lists, if
you omit the mask from an associated IP host address access list specification, 255.255.255.255 is assumed to be the mask.
After creating an access list, you must apply it to a line or interface, as shown in the following section,
"Apply the Access List to an Interface ".
Model Name
- 200 -

Advertisement

Table of Contents
loading

This manual is also suitable for:

Di-2621Di-2630Di-3660

Table of Contents