Figure 10-5 Create Extend-IP Rule

The following entries are displayed on this screen:

¾Create Extend-IP ACL

ACL ID:

Select the desired Extend-IP ACL for configuration.

Rule ID:

Enter the rule ID.

Operation:

Select the operation for the switch to process packets which match the

 

rules.

 

z

Permit: Forward packets.

 

z

Deny: Discard Packets.

S-IP:

Enter the source IP address contained in the rule.

D-IP:

Enter the destination IP address contained in the rule.

Mask:

Enter IP address mask. If it is set to 1, it must strictly match the

 

address.

IP Protocol:

Select IP protocol contained in the rule.

S-Port:

Configure TCP/IP source port contained in the rule when TCP/UDP is

 

selected from the pull-down list of IP Protocol.

D-Port:

Configure TCP/IP destination port contained in the rule when

 

TCP/UDP is selected from the pull-down list of IP Protocol.

10.2 Policy Config

A Policy is used to control the data packets those match the corresponding ACL rules by configuring ACLs and actions together for effect.

The Policy Config can be implemented on Policy Summary, Police Create and Action Create pages.

10.2.1 Policy Summary

On this page, you can view the ACL and the corresponding operations in the policy.

110

Page 117
Image 117
TP-Link TL-SG2008 manual Policy Config, Policy Summary, ¾ Create Extend-IP ACL, IP Protocol