EasyManua.ls Logo

Delta DVS Series User Manual

Delta DVS Series
173 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #96 background imageLoading...
Page #96 background image
Chapter 3 Featured Functions
3.10.2 MAC Rules
After creating an ACL name, you can configure the action, match, destination MAC, source MAC
and VLAN in this page. It can determine whether the packet is forwarded normally or discarded.
Note:
You need to create an implicit deny all rule at the end of an ACL rule table to make
sure that a packet is dropped if an ACL is applied to the packet and none of the
explicit rules match.
Rule Table
Description Factory Default
ID
Enter an ID for the rule. Enter a number between 1 and 10. This means
that you can create up to 10 rules for a single MAC ACL name.
None
Action
Specify the action for the rule:
Permit: Packets that meet the ACL criteria are forwarded.
Deny: Packets that meet the ACL criteria are dropped.
None
3-77

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Delta DVS Series and is the answer not in the manual?

Delta DVS Series Specifications

General IconGeneral
BrandDelta
ModelDVS Series
CategorySwitch
LanguageEnglish

Summary

Chapter 1 Introduction

1.1 Feature

Covers product features like high performance, reliability, and robust design.

1.2 SFP Module Installation

Instructions for inserting and removing SFP modules.

1.3 Package Checklist

Lists the items included in the product package.

Chapter 2 User Interface Introduction

2.1 USB Console Configuration

Details connecting and configuring the switch via USB.

2.2 Telnet Console Configuration

Explains how to configure the switch using Telnet.

2.3 Web Browser Configuration

Describes using the web interface for configuration.

Chapter 3 Featured Functions

3.1 Basic Setting

Covers fundamental settings including system info, network interfaces, port config, DHCP, DNS, and management.

3.3 Network Redundancy

Explains Spanning Tree Protocol (STP) for network reliability and loop prevention.

3.4 Virtual LANs

Details configuring VLANs to segment the network, manage traffic, and enhance security.

3.11 Security Settings

Provides options for securing the switch, including MAC address, IP address, and port authentication.

3.12 Monitoring Settings

Offers tools to monitor switch status, system CPU, interfaces, RMON, SYSLOG, and diagnostics.

3.18 Troubleshooting

Guides on diagnosing and resolving network connectivity issues using Ping and Traceroute functions.

Chapter 4 IEXplorer Utility Introduction

4.1 Starting the Configuration

Instructions on launching and using the IEXplorer utility for device management.

4.3 Settings

Details how to configure devices via Device Configuration or the web interface using IEXplorer.

Appendix A Private MIB Group

A.1 Private MIB Group

Information on private MIBs for SNMP management.

Appendix B MODBUS TCP Map

B.1 Modbus/TCP Map

Provides a map of Modbus TCP registers and their descriptions.

Related product manuals