EasyManua.ls Logo

Enterasys Matrix-V V2H124-24 User Manual

Enterasys Matrix-V V2H124-24
498 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #133 background imageLoading...
Page #133 background image
Access Control Lists
3-83
3
Web – Configure the mask to match the required rules in the IP ingress or egress
ACLs. Set the mask to check for any source or destination address, a specific host
address, or an address range. Include other criteria to search for in the rules, such
as a protocol type or one of the service types. Or use a bitmask to search for specific
protocol port(s) or TCP control code(s). Then click Add.
Figure 3-51. Configuring an IP based ACL
CLI – This shows that the entries in the mask override the precedence in which the
rules are entered into the ACL. In the following example, packets with the source
address 10.1.1.1 are dropped because the “deny 10.1.1.1 255.255.255.255” rule
has the higher precedence according the “mask host any” entry.
Console(config)#access-list ip standard A2 4-113
Console(config-std-acl)#permit 10.1.1.0 255.255.255.0 4-114
Console(config-std-acl)#deny 10.1.1.1 255.255.255.255
Console(config-std-acl)#exit
Console(config)#access-list ip mask-precedence in 4-117
Console(config-ip-mask-acl)#mask host any 4-118
Console(config-ip-mask-acl)#mask 255.255.255.0 any
Console(config-ip-mask-acl)#

Table of Contents

Other manuals for Enterasys Matrix-V V2H124-24

Questions and Answers:

Enterasys Matrix-V V2H124-24 Specifications

General IconGeneral
ModelV2H124-24
Ports24
Uplink Ports4
Power SupplyInternal
Rack MountableYes
PoENo
ManageableYes
Jumbo Frame SupportYes
Humidity10% to 90% non-condensing
TypeSwitch
LayerLayer 2
MAC Address Table Size8K
Dimensions4.4 cm x 44 cm x 38.1 cm
Operating Temperature0 to 40°C
Storage Temperature-20 to 70°C

Summary

Chapter 2: Initial Configuration

Chapter 3: Configuring the Switch

Using the Web Interface

Provides access to switch configuration and statistics via an embedded HTTP Web agent using a standard Web browser.

Setting the IP Address

Explains how to establish IP address information for management access via Manual or Dynamic (DHCP/BOOTP) configuration.

Configuring SNMP

Details SNMP agent configuration, community strings, trap managers, and SNMPv3 security features for network management.

User Authentication

Covers restricting management access via user accounts and authentication settings, including local, RADIUS, TACACS+, and 802.1x port authentication.

VLAN Configuration

Explains creating VLAN groups, assigning ports, configuring VLAN interfaces, and managing VLAN features like GVRP and tagging.

Class of Service Configuration

Allows specification of data packet precedence using priority queues, weighted round-robin, and mapping IP/DSCP priorities to CoS values.

IP Interface Commands

Covers setting IP addresses, default gateways, and managing DHCP/BOOTP client requests for network management access.

DNS Commands

Explains configuring Domain Naming System services, including static host mapping, default domain names, and name server settings.

Chapter 4: Command Line Interface

Using the Command Line Interface

Describes how to access the CLI via console or Telnet, enter commands using keywords and arguments, and utilize command completion and help.

Authentication Commands

Covers switch authentication methods for users logging into the system and port-based authentication using IEEE 802.1x.

Spanning Tree Commands

Includes commands to configure Spanning Tree Algorithm globally and for selected interfaces, covering modes, priorities, and path costs.

VLAN Commands

Explains commands for creating VLAN groups, configuring VLAN interfaces, and managing VLAN features like tagging and GVRP.

Priority Commands

Allows specification of data packet precedence using priority queues, weighted round-robin, and mapping IP/DSCP priorities to CoS values.

Multicast Filtering Commands

Details using IGMP snooping and query to intelligently forward multicast traffic, configure static router ports, and display multicast service members.

Appendix A: Troubleshooting

Related product manuals