H3C Technologies H3C Intelligent Management Center User Manual
Page 879
865
•
Select the destination TCP or UDP port by clicking the radio button to the left of the port option
you want to apply in the Destination Port field of the Add Rule page. Options include:
{
Undefined: Allows you to permit or deny traffic for all TCP or UDP port numbers.
{
Specified Port: Allows you to identify a specific TCP or UDP port number or range of numbers.
Click the radio button to the left of Specified Port and select the operator you want to use from
the list located to the right of the Specified Port option.
a.
Enter the TCP or UDP port number in the Port field.
23.
If you selected TCP or UDP as the protocol you want to apply this ACL rule, you could be promoted
to select these options:
{
Click the radio button to the left of Yes in the HP ACK option if you want to apply the rule to
match the TCP ACK, otherwise click on the radio button to the left of No.
{
Click the radio button to the left of Yes in the HP FIN option if you want to apply the rule to
match the TCP FIN, otherwise click on the radio button to the left of No.
{
Click the radio button to the left of Yes in the HP RST option if you want to apply the rule to
match the TCP RST, otherwise click on the radio button to the left of No.
{
Click the radio button to the left of Yes in the HP SYN option if you want to apply the rule to
match the TCP SYN, otherwise click on the radio button to the left of No.
The HP ACK, HP FIN, HP RST, or HP SYN settings are valid only for the HP E series devices.
24.
Select the IP priority you want to apply to ACL from the IP Priority list.
25.
Select the Type of Service for this ACL from the TOS Value list.
26.
Select the DSCP value you want to apply to this ACL from the DSCP Value list.
27.
Do one of the following:
{
Click the radio button to the left of Yes in the Fragment option if you want to apply the rule
to each fragment.
{
Click the radio button to the left of No in the Fragment option if you want to apply the rule to
first fragments.
Traditional packet filtering matched only first fragments of IPv4 packets and allowed all
subsequent non-first fragments to pass through. This resulted in security risks as hackers can
fabricate non-first fragments to attack networks.
28.
Click the radio button to the left of Yes in the Logging option if you want to enable logging for
this rule.
This feature enables the logging of packet filtering only when a module (for example, a firewall)
using the ACL supports logging.
29.
Enter the VPN instance you want to apply to this rule by entering the VPN-instance-name in the
VPN Instance field.
30.
A valid entry must be 0-31 characters that cannot contain question marks or blank spaces. Note
also that this field is case sensitive. If no VPN instance is specified in this field, the rule applies only
to non-VPN packets.
31.
Click OK to create the rule you have just configured.
32.
Do one of the following:
{
To add more rules to the ACL, repeat this step.
{
To modify rules you have already created, click the Modify icon associated with the rule
sequence you want to modify. For more information about modifying a rule set, see "