LevelOne GTL-2691 User Manual

Page 360

Advertising
background image

C

HAPTER

13

| Security Measures

Access Control Lists

– 360 –

where the equivalent binary bit “1” means to match a bit and “0”

means to ignore a bit. The following bits may be specified:

1 (fin) – Finish

2 (syn) – Synchronize

4 (rst) – Reset

8 (psh) – Push

16 (ack) – Acknowledgement

32 (urg) – Urgent pointer

For example, use the code value and mask below to catch packets with
the following flags set:

SYN flag valid, use control-code 2, control bit mask 2

Both SYN and ACK valid, use control-code 18, control bit mask 18

SYN valid and ACK invalid, use control-code 2, control bit mask 18

Time Range – Name of a time range.

W

EB

I

NTERFACE

To add rules to an Extended IPv4 ACL:

1.

Click Security, ACL.

2.

Select Configure ACL from the Step list.

3.

Select Add Rule from the Action list.

4.

Select IP Extended from the Type list.

5.

Select the name of an ACL from the Name list.

6.

Specify the action (i.e., Permit or Deny).

7.

Select the address type (Any, Host, or IP).

8.

If you select “Host,” enter a specific address. If you select “IP,” enter a
subnet address and the mask for an address range.

9.

Set any other required criteria, such as service type, protocol type, or
control code.

10.

Click Apply.

Advertising