LevelOne GTL-2691 User Manual
Page 360

C
HAPTER
13
| Security Measures
Access Control Lists
– 360 –
where the equivalent binary bit “1” means to match a bit and “0”
means to ignore a bit. The following bits may be specified:
■
1 (fin) – Finish
■
2 (syn) – Synchronize
■
4 (rst) – Reset
■
8 (psh) – Push
■
16 (ack) – Acknowledgement
■
32 (urg) – Urgent pointer
For example, use the code value and mask below to catch packets with
the following flags set:
■
SYN flag valid, use control-code 2, control bit mask 2
■
Both SYN and ACK valid, use control-code 18, control bit mask 18
■
SYN valid and ACK invalid, use control-code 2, control bit mask 18
◆
Time Range – Name of a time range.
W
EB
I
NTERFACE
To add rules to an Extended IPv4 ACL:
1.
Click Security, ACL.
2.
Select Configure ACL from the Step list.
3.
Select Add Rule from the Action list.
4.
Select IP Extended from the Type list.
5.
Select the name of an ACL from the Name list.
6.
Specify the action (i.e., Permit or Deny).
7.
Select the address type (Any, Host, or IP).
8.
If you select “Host,” enter a specific address. If you select “IP,” enter a
subnet address and the mask for an address range.
9.
Set any other required criteria, such as service type, protocol type, or
control code.
10.
Click Apply.