Moxa EDS-G516E-4GSFP — настройка списков контроля доступа (ACL) в сетевых коммутаторах [96/116]
![Moxa EDS-518E-MM-SC-4GTXSFP [96/116] Managed ethernet switch ui_2 _fw_5 x featured functions](/views2/1195651/page96/bg60.png)
Managed Ethernet Switch (UI_2.0_FW_5.x) Featured Functions
3-83
How an ACL Works
The ACL working structure is based on access lists. Each access list is a filter. When a packet enters into or exits
from a switch, the ACL will compare the packet to the rules in the access lists, starting from the first rule. If a
packet is rejected or accepted by the first rule, the switch will drop or pass this packet directly without checking
the rest of the lower-priority rules. In other words, Access Control Lists have “Priority Index” as an attribute to
define the priority in the web configuration console.
There are two types of settings for an ACL: list settings and rule settings. In order to be created, an Access
Control List needs the following list settings: Name, Priority Index, Filter Type, and Ports to Apply. Once created,
each Access Control List has its own set of rule settings. Priority Index represents the priority of the names in
the access list. Names at Priority Index 1 have first priority in packet filtering. The Priority Index is adjustable
whenever users need to change the priority. Two types of packet filtering can be used:
• IP based
• MAC Based
The filter type defines whether the access list will examine packets based on IP or MAC address. The type
affects what detailed rules can be edited. You can then assign the ports you would like to apply the list to. You
can also define Ingress and Egress per port.
After adding a new access control list, you can also create new rules for the access control list. Each ACL group
accepts 10 rules. Rules can filter packets by source and destination IP/MAC address, IP protocol, TCP/UDP Port,
Ethernet Type, and VLAN ID.
After all rules are set, the ACL starts to filter the packets by the rule with the highest Priority Index (smaller
number, higher priority). Once a rule denies or accepts its access, the packet will be dropped or passed.
Access Control List Configuration and Setup
Access Control Profile Settings
On this page, you can configure two settings: (1) Add/Modify Access Control list, and (2) Adjust ACL ID.
Add/Modify Access Control List
This function lets you add a new access control profile or modify an existing access control profile. The
operation depends on the ACL ID you select. If the selected ACL ID is still empty, you can start by creating a
new access control profile. Parameters for editing are as follows:
Содержание
- Moxa managed ethernet switch ui_2 _fw_5 x user s manual p.1
- Edition 1 august 2016 p.1
- Www moxa com product p.1
- Www moxa com support p.2
- Trademarks p.2
- Technical support contact information p.2
- Moxa managed ethernet switch ui_2 _fw_5 x user s manual p.2
- Disclaimer p.2
- Copyright notice p.2
- Table of contents p.3
- About this manual p.5
- Getting started p.6
- Usb console configuration 115200 none 8 1 vt100 p.7
- Managed ethernet switch ui_2 _fw_5 x getting started p.7
- Managed ethernet switch ui_2 _fw_5 x getting started p.8
- Managed ethernet switch ui_2 _fw_5 x getting started p.9
- Managed ethernet switch ui_2 _fw_5 x getting started p.10
- Configuration by command line interface cli p.10
- Configuration by web console p.11
- Managed ethernet switch ui_2 _fw_5 x getting started p.11
- Managed ethernet switch ui_2 _fw_5 x getting started p.12
- Managed ethernet switch ui_2 _fw_5 x getting started p.13
- Disabling telnet and browser access p.13
- Featured functions p.14
- System information p.15
- Managed ethernet switch ui_2 _fw_5 x featured functions p.15
- System settings p.15
- Managed ethernet switch ui_2 _fw_5 x featured functions p.16
- User account p.17
- Managed ethernet switch ui_2 _fw_5 x featured functions p.17
- Creating a new account p.17
- Modifying an existing account p.18
- Managed ethernet switch ui_2 _fw_5 x featured functions p.18
- Deleting an existing account p.18
- Password login policy p.19
- Network p.19
- Managed ethernet switch ui_2 _fw_5 x featured functions p.19
- Managed ethernet switch ui_2 _fw_5 x featured functions p.20
- Ip settings p.20
- Managed ethernet switch ui_2 _fw_5 x featured functions p.21
- Ipv6 neighbor cache p.21
- Date and time p.22
- Managed ethernet switch ui_2 _fw_5 x featured functions p.22
- Daylight saving time p.22
- Time setting p.23
- Managed ethernet switch ui_2 _fw_5 x featured functions p.23
- Clock source is from ntp p.23
- Clock source is from local p.23
- Sntp client settings p.24
- Managed ethernet switch ui_2 _fw_5 x featured functions p.24
- Clock source is from sntp p.24
- Managed ethernet switch ui_2 _fw_5 x featured functions p.25
- Ieee 1588 ptp p.25
- How does an ethernet switch affect 1588 synchronization p.25
- Fluctuations p.25
- Can ethernet switches be designed to avoid the effects of these fluctuations p.25
- Can ethernet switches be designed to avoid the effects of these p.25
- Managed ethernet switch ui_2 _fw_5 x featured functions p.26
- Ptp settings p.26
- Managed ethernet switch ui_2 _fw_5 x featured functions p.27
- Ptp status p.28
- Ptp port settings p.28
- Managed ethernet switch ui_2 _fw_5 x featured functions p.28
- Warning notification p.29
- System event settings p.29
- Managed ethernet switch ui_2 _fw_5 x featured functions p.29
- Severity p.30
- Managed ethernet switch ui_2 _fw_5 x featured functions p.30
- Severity p.31
- Port event settings p.31
- Managed ethernet switch ui_2 _fw_5 x featured functions p.31
- Managed ethernet switch ui_2 _fw_5 x featured functions p.32
- Event log settings p.32
- Email settings p.32
- Syslog server settings p.33
- Managed ethernet switch ui_2 _fw_5 x featured functions p.33
- Relay warning status p.34
- Managed ethernet switch ui_2 _fw_5 x featured functions p.34
- Managed ethernet switch ui_2 _fw_5 x featured functions p.35
- Mac address table p.35
- Tftp server p.36
- System files p.36
- Managed ethernet switch ui_2 _fw_5 x featured functions p.36
- Firmware upgrade p.36
- Auto backup configurator abc 02 p.36
- Configuration backup and restore p.37
- Tftp server p.37
- Managed ethernet switch ui_2 _fw_5 x featured functions p.37
- Auto backup configurator abc 02 p.37
- Auto backup configurator abc 02 p.38
- Tftp server p.38
- Managed ethernet switch ui_2 _fw_5 x featured functions p.38
- Log file backup p.38
- Auto backup of event log to prevent overwrite p.38
- Turbo ring dip switch p.39
- Switch reset button p.39
- Managed ethernet switch ui_2 _fw_5 x featured functions p.39
- Restart p.40
- Managed ethernet switch ui_2 _fw_5 x featured functions p.40
- Factory default p.40
- Poe settings p.41
- Poe poe models only p.41
- Managed ethernet switch ui_2 _fw_5 x featured functions p.41
- Poe power management by measured power p.42
- Poe power management by allocated power p.42
- Managed ethernet switch ui_2 _fw_5 x featured functions p.42
- Poe system configuration p.42
- Poe system configuration settings p.43
- Poe port configuration p.43
- Managed ethernet switch ui_2 _fw_5 x featured functions p.43
- Managed ethernet switch ui_2 _fw_5 x featured functions p.44
- Poe device failure check p.45
- Managed ethernet switch ui_2 _fw_5 x featured functions p.45
- Poe warning event settings p.46
- Poe timetabling p.46
- Managed ethernet switch ui_2 _fw_5 x featured functions p.46
- Warning type p.47
- Managed ethernet switch ui_2 _fw_5 x featured functions p.47
- Event type p.47
- Poe diagnose p.48
- Managed ethernet switch ui_2 _fw_5 x featured functions p.48
- Diagnose configuration p.48
- Pse status p.49
- Poe port status p.49
- Monitoring configuration p.49
- Managed ethernet switch ui_2 _fw_5 x featured functions p.49
- Port status p.50
- Poe system status p.50
- Managed ethernet switch ui_2 _fw_5 x featured functions p.50
- The virtual lan vlan concept p.51
- What is a vlan p.51
- System power status p.51
- Monitoring configuration p.51
- Managed ethernet switch ui_2 _fw_5 x featured functions p.51
- Managing a vlan p.52
- Managed ethernet switch ui_2 _fw_5 x featured functions p.52
- Communication between vlans p.52
- Benefits of vlans p.52
- Vlans tagged and untagged membership p.52
- Vlans and the rackmount switch p.52
- Sample applications of vlans using moxa switches p.53
- Managed ethernet switch ui_2 _fw_5 x featured functions p.53
- Vlan settings 802 q p.54
- Quick setting panel p.54
- Managed ethernet switch ui_2 _fw_5 x featured functions p.54
- Configuring a virtual lan p.54
- Vlan id configuration table p.55
- Managed ethernet switch ui_2 _fw_5 x featured functions p.55
- Attention p.55
- Vlan settings port based p.56
- Vlan name setting p.56
- Managed ethernet switch ui_2 _fw_5 x featured functions p.56
- Qinq settings p.57
- Managed ethernet switch ui_2 _fw_5 x featured functions p.57
- Vlan table p.57
- Port settings p.58
- Managed ethernet switch ui_2 _fw_5 x featured functions p.58
- Port status p.59
- Managed ethernet switch ui_2 _fw_5 x featured functions p.59
- Link aggregation p.59
- The port trunking concept p.60
- Port trunking p.60
- Managed ethernet switch ui_2 _fw_5 x featured functions p.60
- Trunking status p.61
- Managed ethernet switch ui_2 _fw_5 x featured functions p.61
- Link swap fast recovery p.61
- Multicast filtering p.62
- Multicast p.62
- Managed ethernet switch ui_2 _fw_5 x featured functions p.62
- Benefits of multicast p.62
- What is an ip multicast p.62
- The concept of multicast filtering p.62
- Multicast filtering and moxa s industrial rackmount switches p.63
- Managed ethernet switch ui_2 _fw_5 x featured functions p.63
- Static multicast mac p.64
- Managed ethernet switch ui_2 _fw_5 x featured functions p.64
- Igmp multicast filtering p.64
- Gmrp garp multicast registration protocol p.64
- Enabling multicast filtering p.64
- Managed ethernet switch ui_2 _fw_5 x featured functions p.65
- Igmp snooping setting p.65
- Igmp snooping p.65
- Managed ethernet switch ui_2 _fw_5 x featured functions p.66
- Igmp group status p.66
- Static multicast address p.67
- Managed ethernet switch ui_2 _fw_5 x featured functions p.67
- Stream table p.67
- Multicast filtering behavior p.68
- Managed ethernet switch ui_2 _fw_5 x featured functions p.68
- The traffic prioritization concept p.69
- Managed ethernet switch ui_2 _fw_5 x featured functions p.69
- Ieee 802 d traffic marking p.69
- Traffic queues p.70
- Traffic prioritization p.70
- Managed ethernet switch ui_2 _fw_5 x featured functions p.70
- Differentiated services diffserv traffic marking p.70
- Managed ethernet switch ui_2 _fw_5 x featured functions p.71
- Cos classification p.71
- Configuring traffic prioritization p.71
- Priority mapping type 1 p.72
- Managed ethernet switch ui_2 _fw_5 x featured functions p.72
- Dscp mapping p.73
- Priority mapping type 2 p.73
- Managed ethernet switch ui_2 _fw_5 x featured functions p.73
- Type 1 p.74
- Rate limiting p.74
- Managed ethernet switch ui_2 _fw_5 x featured functions p.74
- Rate limiting normal p.75
- Managed ethernet switch ui_2 _fw_5 x featured functions p.75
- Ingress rate limit p.75
- Egress rate limit p.75
- Type 2 p.76
- Rate limiting port disable p.76
- Managed ethernet switch ui_2 _fw_5 x featured functions p.76
- Rate limiting port disable p.77
- Rate limiting drop packet p.77
- Managed ethernet switch ui_2 _fw_5 x featured functions p.77
- Managed ethernet switch ui_2 _fw_5 x featured functions p.78
- Type 3 p.78
- Rate limiting drop packet p.78
- Type 4 p.79
- Rate limiting port disable p.79
- Managed ethernet switch ui_2 _fw_5 x featured functions p.79
- Rate limiting normal p.80
- Managed ethernet switch ui_2 _fw_5 x featured functions p.80
- Ingress rate limit p.80
- Egress rate limit p.80
- Security p.81
- Rate limiting port disable p.81
- Management interface p.81
- Managed ethernet switch ui_2 _fw_5 x featured functions p.82
- Trusted access p.83
- Managed ethernet switch ui_2 _fw_5 x featured functions p.83
- Authentication p.84
- Ssl certificate management p.84
- Ssh key management p.84
- Managed ethernet switch ui_2 _fw_5 x featured functions p.84
- Login authentication p.84
- Managed ethernet switch ui_2 _fw_5 x featured functions p.85
- Managed ethernet switch ui_2 _fw_5 x featured functions p.86
- Ieee 802 x settings p.86
- Managed ethernet switch ui_2 _fw_5 x featured functions p.87
- Managed ethernet switch ui_2 _fw_5 x featured functions p.88
- Ieee 802 x local database p.88
- Managed ethernet switch ui_2 _fw_5 x featured functions p.89
- Mac authentication bypass settings p.89
- Radius server settings p.90
- Managed ethernet switch ui_2 _fw_5 x featured functions p.90
- Port security p.91
- Managed ethernet switch ui_2 _fw_5 x featured functions p.91
- Port security mode p.91
- Static port lock p.92
- Managed ethernet switch ui_2 _fw_5 x featured functions p.92
- Managed ethernet switch ui_2 _fw_5 x featured functions p.93
- Mac address sticky p.93
- Port access control table p.94
- Managed ethernet switch ui_2 _fw_5 x featured functions p.94
- Broadcast storm protection p.94
- What is acl p.95
- The acl concept p.95
- Loop protection p.95
- Benefits of acl p.95
- Access control list p.95
- Add modify access control list p.96
- Access control profile settings p.96
- Access control list configuration and setup p.96
- Managed ethernet switch ui_2 _fw_5 x featured functions p.96
- How an acl works p.96
- Managed ethernet switch ui_2 _fw_5 x featured functions p.97
- Ip based layer 2 device p.97
- Adjust acl id p.97
- Access control rule settings p.97
- Managed ethernet switch ui_2 _fw_5 x featured functions p.98
- Ip based layer 3 device p.98
- Mac based layer 2 device p.99
- Managed ethernet switch ui_2 _fw_5 x featured functions p.100
- Mac based layer 3 device p.100
- Ip port binding p.101
- Dhcp relay agent p.101
- Access control list table p.101
- Managed ethernet switch ui_2 _fw_5 x featured functions p.102
- Dhcp relay agent option 82 p.102
- Server ip address p.103
- Managed ethernet switch ui_2 _fw_5 x featured functions p.103
- Dhcp option 82 p.103
- Dhcp function table p.103
- Managed ethernet switch ui_2 _fw_5 x featured functions p.104
- Snmp read write settings p.105
- Managed ethernet switch ui_2 _fw_5 x featured functions p.105
- Trap settings p.106
- Snmp trap mode trap p.106
- Snmp trap mode inform p.106
- Managed ethernet switch ui_2 _fw_5 x featured functions p.106
- Overview p.107
- Industrial protocols p.107
- Diagnostics p.107
- General settings p.108
- Configuring lldp settings p.108
- Port mirroring p.108
- Managed ethernet switch ui_2 _fw_5 x featured functions p.108
- Lldp table p.108
- Monitoring p.109
- Managed ethernet switch ui_2 _fw_5 x featured functions p.109
- Cpu memory utilization p.109
- Statistics p.110
- Managed ethernet switch ui_2 _fw_5 x featured functions p.110
- Managed ethernet switch ui_2 _fw_5 x featured functions p.111
- Fiber digital diagnostics monitoring sfp ddm and fiber p.111
- Sfp digital diagnostic monitor p.112
- Managed ethernet switch ui_2 _fw_5 x featured functions p.112
- Fiber check p.112
- Managed ethernet switch ui_2 _fw_5 x featured functions p.113
- Fiber check threshold values p.113
- Event log p.114
- Managed ethernet switch ui_2 _fw_5 x featured functions p.114
- Mib ii udp group p.115
- Mib ii tcp group p.115
- Mib ii system group p.115
- Mib ii ip group p.115
- Mib ii interfaces group p.115
- Mib ii icmp group p.115
- Mib ii 7 dot1dbridge group p.115
- Mib ii 1 snmp group p.115
- Mib ii 0 transmission group p.115
- Mib groups p.115
- Public traps p.116
- Private traps p.116
- Managed ethernet switch ui_2 _fw_5 x mib groups p.116
Похожие устройства
-
Moxa IMC-21GA-SX-SC-TТехнические характеристики -
Moxa IMC-21GA-SX-SC-TРуководство пользователя Англ. -
Moxa IMC-21GA-SX-SC-TИнструкция по эксплуатации -
Moxa IMC-21GA-SX-SCТехнические характеристики -
Moxa IMC-21GA-SX-SCРуководство пользователя Англ. -
Moxa IMC-21GA-SX-SCИнструкция по эксплуатации -
Moxa IMC-21GA-LX-SC-TТехнические характеристики -
Moxa IMC-21GA-LX-SC-TРуководство пользователя Англ. -
Moxa IMC-21GA-LX-SC-TИнструкция по эксплуатации -
Moxa IMC-21GA-LX-SCТехнические характеристики -
Moxa IMC-21GA-LX-SCРуководство пользователя Англ. -
Moxa IMC-21GA-LX-SCИнструкция по эксплуатации
Узнайте, как настроить списки контроля доступа (ACL) для фильтрации сетевого трафика на основе IP-адресов, MAC-адресов и других параметров. Обеспечьте безопасность сети и контролируйте доступ к ресурсам.