set security acl
461
0 or 3—Best effort. Packets are queued in MAP forwarding
queue 3.
4 or 5—Video. Packets are queued in MAP forwarding queue 2.
Use CoS level 4 or 5 for voice over IP (VoIP) packets other than
SpectraLink Voice Priority (SVP).
6 or 7—Voice. Packets are queued in MAP forwarding queue 1.
In MSS Version 3.0, use 6 or 7 only for VoIP phones that use SVP,
not for other types of traffic.
deny
— Blocks traffic that matches the conditions in the ACE.
protocol
— IP protocol by which to filter packets:
ip
tcp
udp
icmp
A protocol number between 0 and 255.
(For a complete list of IP protocol names and numbers, see
www.iana.org/assignments/protocol-numbers
.)
source-ip-addr mask
— IP address and wildcard mask of the
network or host from which the packet is being sent. Specify both
address and mask in dotted decimal notation. For more information,
see “Wildcard Masks” on page 26.
operator
port
[
port2
] — Operand and port number(s) for matching
TCP or UDP packets to the number of the source or destination port
on source-ip-addr or destination-ip-addr. Specify one of the following
operands and the associated port:
eq
— Packets are filtered for only
port
number.
gt
— Packets are filtered for all ports that are greater than
port
number.
lt
— Packets are filtered for all ports that are less than
port
number.
neq
— Packets are filtered for all ports except
port
number.
range
— Packets are filtered for ports in the range between
port
and
port2
. To specify a port range, enter two port numbers. Enter
the lower port number first, followed by the higher port number.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...