16 voice vlan oui table, 10 access control lists – Interlogix NS3550-8T-2S User Manual User Manual
Page 183
![background image](/manuals/679214/183/background.png)
183
4.9.16 Voice VLAN OUI Table
Configure VOICE VLAN OUI table on this page. The maximum entry number is 16. Modifying the OUI table will restart auto
detection of OUI process. The Voice VLAN OUI Table screen in
Figure 4-9-19
appears.
Figure 4-9-19 :
Voice VLAN OUI Table Page Screenshot
The page includes the following fields:
Object
Description
Delete
Check to delete the entry. It will be deleted during the next save.
Telephony OUI
An telephony OUI address is a globally unique identifier assigned to a vendor by
IEEE. It must be 6 characters long and the input format is "xx-xx-xx" (x is a
hexadecimal digit).
Description
The description of OUI address. Normaly, it descript which vendor telephony
device. The allowed string length is 0 to 32.
Buttons
:
Click to add a new access management entry.
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
4.10 Access Control Lists
ACL is an acronym for Access Control List. It is the list table of ACEs, containing access control entries that specify individual
users or groups permitted or denied to specific traffic objects, such as a process or a program.
Each accessible traffic object contains an identifier to its ACL. The privileges determine whether there are specific traffic object
access rights.
ACL implementations can be quite complex, for example, when the ACEs are prioritized for the various situation. In networking,
the ACL refers to a list of service ports or network services that are available on a host or server, each with a list of hosts or
servers permitted or denied to use the service. ACL can generally be configured to control inbound traffic, and in this context,
they are similar to firewalls.
ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID.
There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also
contains many detailed, different parameter options that are available for individual application.