LevelOne GSW-2692 manual Permit, deny Ip access-group 4-94 show ip access-list, Standard ACL

Models: GSW-2692

1 390
Download 390 pages 4.67 Kb
Page 269
Image 269

Access Control List Commands 4

Command Usage

When you create a new ACL or enter configuration mode for an existing ACL, use the permit or deny command to add new rules to the bottom of the list. To create an ACL, you must add at least one rule to the list.

To remove a rule, use the no permit or no deny command followed by the exact text of a previously configured rule.

An ACL can contain up to 32 rules.

Example

Console(config)#access-list ip standard david

Console(config-std-acl)#

Related Commands

permit, deny 4-91

ip access-group (4-94) show ip access-list (4-94)

permit, deny (Standard ACL)

This command adds a rule to a Standard IP ACL. The rule sets a filter condition for packets emanating from the specified source. Use the no form to remove a rule.

Syntax

[no] {permit deny} {any source bitmask host source}

any – Any source IP address.

source – Source IP address.

bitmask – Decimal number representing the address bits to match.

host – Keyword followed by a specific IP address.

Default Setting

None

Command Mode

Standard ACL

Command Usage

New rules are appended to the end of the list.

Address bitmasks are similar to a subnet mask, containing four integers from 0 to 255, each separated by a period. The binary mask uses 1 bits to indicate “match” and 0 bits to indicate “ignore.” The bitmask is bitwise ANDed with the specified source IP address, and then compared with the address for each IP packet entering the port(s) to which this ACL has been assigned.

4-91

Page 269
Image 269
LevelOne GSW-2692 manual Permit, deny Ip access-group 4-94 show ip access-list, Standard ACL

GSW-2692 specifications

The LevelOne GSW-2692 is an advanced Layer 2 Gigabit Ethernet switch that is designed to cater to the networking needs of both small and medium-sized enterprises. Highly regarded for its reliability and performance, the GSW-2692 offers 24 Gigabit Ethernet ports, enabling seamless and high-speed data transfers across connected devices. With its robust design and versatile capabilities, this switch has earned its place as an essential component in modern IT infrastructure.

One of the standout features of the GSW-2692 is its extensive support for advanced networking technologies. The switch includes support for IEEE 802.1Q VLAN tagging, which allows users to create separate virtual networks for improved traffic management and enhanced security. By segregating network traffic, businesses can optimize bandwidth usage and reduce congestion, contributing to overall increased network performance.

Additionally, the GSW-2692 supports Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP), ensuring loop-free network topology. This capability is crucial in larger networking environments where multiple switches are interconnected, as it prevents broadcast storms and enhances network resilience. The switch also includes features such as port mirroring, which provides administrators with the capability to monitor network traffic in real-time for troubleshooting and analysis.

Power over Ethernet (PoE) support is another significant advantage of the GSW-2692. With PoE functionality, it enables the switch to deliver electrical power along with data to connected devices such as IP cameras, VoIP phones, and wireless access points, eliminating the need for additional power sources and simplifying installations.

In terms of physical characteristics, the LevelOne GSW-2692 is designed for efficient heat dissipation and features a fanless design, which ensures silent operation. Its desktop or rack-mountable options make it flexible for various installation environments. The switch also features a web-based management interface, which simplifies the configuration and monitoring processes, allowing for intuitive management of network settings.

Overall, the LevelOne GSW-2692 stands out as a feature-rich, reliable, and high-performance networking solution that meets the demands of modern enterprises. Its combination of advanced technologies, scalability, and ease of use makes it an excellent choice for businesses looking to enhance their network infrastructure.