Defining Access Control Lists | 91 |
Add Rules to ACL
■Protocol — Defines the protocol in the rule to which the packet is matched. The possible fields are:
■Select from List — Selects a protocol from a list by which packets are matched.
■Protocol ID — Adds
■Source Port — Defines the source port that is used for matched packets. Enabled only when TCP or UDP are selected in the Protocol list. The field value is either user defined or Any. If Any is selected the IP based ACL is applied to any source port.
■Destination Port — Defines the destination port that is used for matched packets. Enabled only when TCP or UDP are selected in the Protocol list. The field value is either user defined or Any. If Any is selected, the IP based ACL is applied to any destination port.
■TCP Flags — If checked, enables configuration of TCP flags matched to the packet. The possible fields are:
■URG — Urgent pointer field significant. The urgent pointer points to the sequence number of the octet following the urgent data.
■ACK — Acknowledgement field significant. The acknowledgement field is the byte number of the next byte that the sender expects to receive from the receiver.
■PSH — Push (send) the data as soon as possible, without buffering. This is used for interactive traffic.
■RST — Reset the connection. This invalidates the sequence numbers and aborts the session between the sender and receiver.
■SYN — Synchronize Initial Sequence Numbers (ISNs). This is used to initialize a new connection.
■FIN — Finish. This indicates there is no more data from the sender. This marks a normal closing of the session between the sender and receiver.
For each TCP flag, the possible field values are:
■Set — Enables the TCP flag.
■Unset — Disables the TCP flag.
■Don’t Care — Does not check the packet’s TCP flag.