beautypg.com

Access control lists – NETGEAR AV Line M4250 GSM4210PX 8-Port Gigabit PoE+ Compliant Managed AV Switch with SFP (220W) User Manual

Page 646

background image

Table 160. Captive portal client statistics

Description

Field

The client MAC address.

MAC Address

The IP address of the client.

IP Address Drops

The connection protocol, which is either HTTP or HTTPS.

Protocol

The authentication type, which is Guest, Local, or RADIUS.

Verification

The period that passed since the client was authorized.

Session Time

The interface the client is using.

Interface

The ID of the captive portal.

CP ID

The user name (or guest ID) of the connected client.

User Name

The total number of bytes the client received.

Bytes Received

The total number of bytes the client transmitted.

Bytes Transmitted

The total number of packets the client received.

Packets Received

The total number of packets the client transmitted.

Packets Transmitted

Access control lists

Access control lists (ACLs) ensure that only authorized users can access specific resources
while blocking any unwarranted attempts to reach network resources. ACLs are used
to provide traffic flow control, restrict contents, decide which types of traffic are forwarded
or blocked, and provide security for the network. The switch supports a total of 100
ACLs, which can be a combination of MAC ACLs, basic IPv4 ACL, extended IPv4 ACLs,
and IPv6 ACLs.

To configure an ACL:

1. Create an IPv4-based, IPv6-based, or MAC-based ACL ID.

2. Create a rule and assign it to a unique ACL ID.

3. Define the rules, which can identify protocols, source, and destination IP and MAC

addresses, and other packet-matching criteria.

4. Use the ID number to assign the ACL to a port or to a LAG. To view ACL configuration

examples, see Access control lists (ACLs) on page 768.

Main User Manual

646

Manage Switch Security

AV Line of Fully Managed Switches M4250 Series Main User Manual