Chapter 5
Advanced Configuration
34
WebView Switches
The GVRP Error Statistics Table contains the following
fields:
Invalid Protocol ID
Displays the device GVRP Invalid
Protocol ID statistics.
Invalid Attribute Type
Displays the device GVRP Invalid
Attribute ID statistics.
Invalid Attribute Value
Displays the device GVRP Invalid
Attribute Value statistics.
Invalid Attribute Length
Displays the device GVRP
Invalid Attribute Length statistics.
Invalid Event
Displays the device GVRP Invalid Events
statistics.
Use the
Clear All Counters
button to reset all tables.
ACL > IP Based ACL
The
IP Based ACL (Access Control List)
screen contains
information for defining IP-based Access Control Lists
(ACLs).
ACL > IP Based ACL
ACL Name
Displays the user-defined IP based ACLs.
New ACL Name
Define a new user-defined IP based ACL,
the name cannot include spaces.
Delete ACL
Deletes the selected ACL.
Action
Indicates the action assigned to the packet
matching the ACL. Packets are forwarded or dropped. In
addition, the port can be shut down, a trap can be sent
to the network administrator, or a packet assigned rate
limiting restrictions for forwarding. The options are as
follows:
Permit
•
Forwards
packets
which
meet
the
ACL
criteria.
Deny
•
Drops packets which meet the ACL criteria.
Shutdown
•
Drops
packet
that
meets
the
ACL
criteria, and disables the port to which the packet
was addressed. Ports are reactivated from the
Port
Management
screen.
Protocol
Creates an Access Control Entry (ACE) based on
a specific protocol.
Select from List
•
Selects from a protocols list on which
ACE can be based. The possible field values are:
Any
•
Matches the protocol to any protocol.
EIGRP
•
Indicates
that
the
Enhanced
Interior
Gateway Routing Protocol (EIGRP) is used to classify
network flows.
ICMP
•
Indicates that the Internet Control Message
Protocol (ICMP) is used to classify network flows.
IGMP
•
Indicates
that
the
Internet
Group
Management Protocol (IGMP) is used to classify
network flows.
TCP
•
Indicates
that
the
Transmission
Control
Protocol is used to classify network flows.
OSPF
•
Matches the packet to the Open Shortest
Path First (OSPF) protocol.
UDP
•
Indicates that the User Datagram Protocol is
used to classify network flows.
Protocol ID To Match
•
Adds user-defined protocols to
which packets are matched to the ACE. Each protocol
has a specific protocol number which is unique. The
possible field range is
0–255
.
TCP Flags
Filters packets by TCP flag. Filtered packets
are either forwarded or dropped. Filtering packets by TCP
flags increases packet control, which increases network
security. The values that can be assigned are:
Set
•
Enables filtering packets by selected flags.
Unset
•
Disables filtering packets by selected flags.
Don’t care
•
Indicates that selected packets do not
influence the packet filtering process.
The TCP Flags that can be selected are:
Urg
•
Indicates the packet is urgent.
Ack
•
Indicates the packet is acknowledged.
Psh
•
Indicates the packet is pushed.
Rst
•
Indicates the connection is dropped.
Syn
•
Indicates request to start a session.
Fin
•
Indicates request to close a session.