Cisco SCE 1000 and Technical Information Page 28

  • Download
  • Add to my manuals
  • Print
  • Page
    / 58
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 27
28
Step 3 Type the TCP port number of the RDR-formatter destination and press Enter.
Note that there is no default for this parameter.
Enter RDR-formatter destination’s TCP port number:
EXAMPLE:
Following is a sample RDR-formatter configuration dialog, assigning the IP address and TCP port number.
Would you like to enter the RDR-formatter configuration menu? [no]: y
Enter RDR-formatter destination’s IP address: 10.1.1.230
Enter RDR-formatter destination’s TCP port number: 33000
Step 7: Configuring Access Control Lists (ACLs)
The SCE 1000 can be configured with Access Control Lists (ACLs), which are used to permit or deny incoming
connections on any of the management interfaces.
Note
ACL #0 is a pre-defined list that permits access to all IP addresses.
Configuration of access control lists is done in two stages:
Step 1 Create the access control lists.
You may create 99 ACLs with a maximum of 20 entries per list. Each entry consists of an IP address, and an indication of
whether access is permitted or denied to this IP address.
Step 2
Assign the ACLs to the appropriate management interface. (See Step 9: Configuring the Topology-Dependent
Parameters.)
The dialog permits you to skip the creation/editing of the ACLs and go directly to assigning ACLs to the management
interfaces.
Entry Formats
Each ACL may permit/deny access to any IP address, one or more ranges of IP addresses, or one or more individual IP
address. Three entry formats are available to support these options:
Any IP address: Type the word “any”. Any IP address will be permitted or denied access.
Range of IP addresses: Type the beginning IP address in the desired range, then enter the wildcard bits that define the
range.
This wildcard functions like a reverse mask, in that all “1” bits in the wildcard indicate the corresponding bit in the IP
address should be ignored. All other bits must match the corresponding bit in the specified IP address. Refer to the
table below for examples.
Each range of IP addresses can be configured to be permitted or denied access.
Page view 27
1 2 ... 23 24 25 26 27 28 29 30 31 32 33 ... 57 58

Comments to this Manuals

No comments