VLAN operation ... 11-58
VLAN use, multiple clients ... 11-6
VLAN, assignment conflict ... 11-12
VLAN, membership priority ... 11-10, 11-30
VLAN, priority, RADIUS ... 11-34
VLAN, tagged membership ... 11-34
Wake-on-LAN traffic ... 11-27
Web/MAC Auth effect ... 11-66
A
aaa
authentication, authorized ... 5-9
authorized ... 5-9
GVRP VLANs ... 11-64
aaa authentication ... 4-8
privilege-mode ... 4-11
privilege-mode defined ... 4-11
aaa port-access
See Web or MAC Authentication.
AC
CIDR, mask ... 9-41
access levels, authorized IP managers ... 13-3
accounting
See RADIUS.
ACL
ACE sequence ... 9-38
ACE, after match not used ... 9-36
ACE, defined ... 9-6
ACE, duplicates ... 9-38
ACE, limit ... 9-24
ACE, order in list
See sequence, ACEs.
ACL ID, defined ... 9-6
ACL log message
See ACL, logging.
ACL mask ... 9-20
ACL, defined ... 9-6
application planning ... 9-16
application, recommended ... 9-3
applied to open connection ... 9-71
assign to VLAN ... 9-37
basic structure ... 9-33
broadcasts, effect on ... 9-71
CIDR, mask ... 9-38
command summary ... 9-5
command syntax ... 9-40
configuration planning ... 9-11
configured but not used ... 9-37
configured, not used ... 9-37
configuring offline ... 9-10
copy operation appends ... 9-64
create, CLI method ... 9-38
DA, defined ... 9-7, 9-8
definitions ... 9-6
deny any, implicit ... 9-10, 9-12, 9-13, 9-15, 9-22,
9-23, 9-24, 9-33, 9-36, 9-37
deny any, implicit, supersede ... 9-33
deny any, implicit, switched packets ... 9-14
deny any, rule use ... 9-17
deny, defined ... 9-7
editing ... 9-38
end ... 9-37
exit statement ... 9-37
extended ACL, resource use ... 9-17
extended, defined ... 9-7, 9-32
extended, numeric I.D. range ... 9-32
extended, structure ... 9-34
extended, use ... 9-9
filtering criteria ... 9-9
filtering process ... 9-13, 9-14, 9-23
host option ... 9-29
i.d. range, 1-99 ... 9-39
implicit deny
See deny any, implicit.
implicit deny, defined ... 9-7
inbound traffic, defined ... 9-8
logging ... 9-10, 9-11
logging described ... 9-67
logging, ACLs ... 9-41
logging, performance impact ... 9-11
logging, session ... 9-10
managing resource use ... 9-18
mask ... 9-10, 9-27
mask bit overlap ... 9-20
mask usage ... 9-16
mask, ACL ... 9-20
mask, CIDR ... 9-38
mask, defined ... 9-7
mask, multiple IP addresses ... 9-30
mask, one IP address ... 9-29
match, always ... 9-37
match, criteria ... 9-28
match, example ... 9-29
match, ignored ... 9-23
maximum allowed ... 9-24
Index – 3
Need help?
Do you have a question about the 2610 and is the answer not in the manual?
Questions and answers