WESM zl Management and Configuration Guide WT.01.28 and greater
7-29
Access Control Lists (ACLs)
Configuring ACLs
Table 7-6. Action IDs for ACL Statistics
■ Protocol—protocol for selected packets
Table 7-7 provides a key for the protocols.
Table 7-7. Protocol IDs for ACL Statistics
■ Low Source IP—the lowest source IP address specified for the rule
■ High Source IP—the highest source IP address specified for the rule
■ Low Destination IP—the lowest destination IP address specified for the rule
(always 0.0.0.0 for standard ACLs)
■ High Destination IP—the highest destination IP address specified for the rule
(always 0.0.0.0 for standard ACLs)
■ Times Used—the number of times that the Wireless Edge Services zl Module
has applied the ACL rule to traffic
The counter increments when the module drops a denied packet or when permits
the first packet in a session. The Wireless Edge Services zl Module support
stateful ACLs, which means that it automatically allows all traffic in the session.
Check this column periodically to ensure that ACL rules are affecting traffic. If
not, you might need to reconfigure ACLs to make them more relevant to your
network. You can also check for a deny rule that filters out traffic that should be
allowed.
To view detailed statistics for a specific interface, select the interface and click the
Details button. The Details screen is displayed.
ID Protocol
2 drop—a deny rule
3 forward—a permit or mark rule
ID Protocol
-1 IP
1ICMP
6TCP
17 UDP