Access control lists – NETGEAR AV Line M4250 GSM4210PX 8-Port Gigabit PoE+ Compliant Managed AV Switch with SFP (220W) User Manual
Page 646
Table 160. Captive portal client statistics
Description
Field
The client MAC address.
MAC Address
The IP address of the client.
IP Address Drops
The connection protocol, which is either HTTP or HTTPS.
Protocol
The authentication type, which is Guest, Local, or RADIUS.
Verification
The period that passed since the client was authorized.
Session Time
The interface the client is using.
Interface
The ID of the captive portal.
CP ID
The user name (or guest ID) of the connected client.
User Name
The total number of bytes the client received.
Bytes Received
The total number of bytes the client transmitted.
Bytes Transmitted
The total number of packets the client received.
Packets Received
The total number of packets the client transmitted.
Packets Transmitted
Access control lists
Access control lists (ACLs) ensure that only authorized users can access specific resources
while blocking any unwarranted attempts to reach network resources. ACLs are used
to provide traffic flow control, restrict contents, decide which types of traffic are forwarded
or blocked, and provide security for the network. The switch supports a total of 100
ACLs, which can be a combination of MAC ACLs, basic IPv4 ACL, extended IPv4 ACLs,
and IPv6 ACLs.
To configure an ACL:
1. Create an IPv4-based, IPv6-based, or MAC-based ACL ID.
2. Create a rule and assign it to a unique ACL ID.
3. Define the rules, which can identify protocols, source, and destination IP and MAC
addresses, and other packet-matching criteria.
4. Use the ID number to assign the ACL to a port or to a LAG. To view ACL configuration
examples, see Access control lists (ACLs) on page 768.
Main User Manual
646
Manage Switch Security
AV Line of Fully Managed Switches M4250 Series Main User Manual