![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/7/37/7374c104-7e40-4d83-8c71-b9c0f21fcd05/7374c104-7e40-4d83-8c71-b9c0f21fcd05-bg29.png)
Chapter 5
Advanced Configuration
34
WebView Switches
The GVRP Error Statistics Table contains the following
fields:
Invalid Protocol ID Displays the device GVRP Invalid
Protocol ID statistics.
Invalid Attribute Type Displays the device GVRP Invalid
Attribute ID statistics.
Invalid Attribute Value Displays the device GVRP Invalid
Attribute Value statistics.
Invalid Attribute Length Displays the device GVRP
Invalid Attribute Length statistics.
Invalid Event Displays the device GVRP Invalid Events
statistics.
Use the Clear All Counters button to reset all tables.
ACL > IP Based ACL
The IP Based ACL (Access Control List) screen contains
information for defining IP-based Access Control Lists
(ACLs).
ACL > IP Based ACL
ACL Name Displays the user-defined IP based ACLs.
New ACL Name Define a new user-defined IP based ACL,
the name cannot include spaces.
Delete ACL Deletes the selected ACL.
Action Indicates the action assigned to the packet
matching the ACL. Packets are forwarded or dropped. In
addition, the port can be shut down, a trap can be sent
to the network administrator, or a packet assigned rate
limiting restrictions for forwarding. The options are as
follows:
Permit • Forwards packets which meet the ACL
criteria.
Deny • Drops packets which meet the ACL criteria.
Shutdown • Drops packet that meets the ACL
criteria, and disables the port to which the packet
was addressed. Ports are reactivated from the Port
Management screen.
Protocol Creates an Access Control Entry (ACE) based on
a specific protocol.
Select from List • Selects from a protocols list on which
ACE can be based. The possible field values are:
Any • Matches the protocol to any protocol.
EIGRP • Indicates that the Enhanced Interior
Gateway Routing Protocol (EIGRP) is used to classify
network flows.
ICMP • Indicates that the Internet Control Message
Protocol (ICMP) is used to classify network flows.
IGMP • Indicates that the Internet Group
Management Protocol (IGMP) is used to classify
network flows.
TCP • Indicates that the Transmission Control
Protocol is used to classify network flows.
OSPF • Matches the packet to the Open Shortest
Path First (OSPF) protocol.
UDP • Indicates that the User Datagram Protocol is
used to classify network flows.
Protocol ID To Match • Adds user-defined protocols to
which packets are matched to the ACE. Each protocol
has a specific protocol number which is unique. The
possible field range is 0–255.
TCP Flags Filters packets by TCP flag. Filtered packets
are either forwarded or dropped. Filtering packets by TCP
flags increases packet control, which increases network
security. The values that can be assigned are:
Set • Enables filtering packets by selected flags.
Unset • Disables filtering packets by selected flags.
Don’t care • Indicates that selected packets do not
influence the packet filtering process.
The TCP Flags that can be selected are:
Urg • Indicates the packet is urgent.
Ack • Indicates the packet is acknowledged.
Psh • Indicates the packet is pushed.
Rst • Indicates the connection is dropped.
Syn • Indicates request to start a session.
Fin • Indicates request to close a session.