Search

Help

Page 1 of 2. Showing 19 results (0.053 seconds)

  1. Managing ACLs

    The ACL API ACL Overview The Access Control List (ACL) filters packets passed from the AppNexus core switch into your VLAN. An ACL is made up of an ordered set…
    Cloud ServicesSep 29, 2011
  2. manage-vlan

    address manage-vlan get-acl --vlan-id vlan_id [--file path] manage-vlan set-acl --vlan-id vlan_id (--file path | -) [--async] [--force] manage-vlan…
    Cloud ServicesFeb 22, 2018
  3. Release 0.176

    manage-gslb-group modify -G NYM1:35 --weight 30 --max-usage 60 ACL API This release introduces a new tool for directly managing your Access Control List (ACL). This tool…
    Cloud ServicesJul 30, 2009
  4. Networking and Firewalls

    will be automatically assigned. For more information, see manage-instance. Instance IPs are static; if the server reboots or the instance goes offline, the IP will remain the same. ACLs/Firewall…
    Cloud ServicesOct 17, 2017
  5. Technical FAQ

    address local to your VLAN. There is no way anybody can snoop or spoof traffic. 19. Why do you use ACLs instead of a stateful firewall? Stateful inspection is most useful…
    Cloud ServicesMay 13, 2016
  6. Subnetworks

    is the netuid and which part is the hostid Masks are used with IP addresses in IP Access Control Lists (ACLs) to specify what should be permitted and denied. Masks to configure IP…
    Cloud ServicesAug 21, 2009
  7. Release 0.248

    datacenter, NYM2. 8. "manage-vlan" write operations can now be synchronous or asynchronous manage-vlan, set-acl and append-acl now wait until the ACL has been committed before returning…
    Cloud ServicesJul 27, 2011
  8. How to Set Firewall Rules

    support ticket to make changes to the Access Control List (ACL). You can set and modify Access Control Entries (ACEs) yourself with new parameters in the manage-vlan CLI tool, which…
    Cloud ServicesSep 14, 2017
  9. Cloud Hosting Glossary

    Cloud Hosting Glossary Access Control Entry (ACE): A record in the . Access Control List (ACL): A list of permissions attached to an object that specifies who or what…
    Cloud ServicesMar 03, 2015
  10. Security Recommendations

    their inventory in order to minimize the risk of security issues. We strongly recommend the following measures: 1. Use your firewall / ACLs to block all unused traffic When…
    Cloud ServicesAug 05, 2009