3Com WX4400 3CRWX440095A User Manual
Page 14

Mapping User-Based Security ACLs
Mapping Security ACLs to Ports, VLANs, Virtual Ports, or Distributed
MAPs
Adding Another ACE to a Security ACL
Placing One ACE before Another
Modifying an Existing Security ACL
Clearing Security ACLs from the Edit Buffer
Filtering Based on DSCP Values
Enabling Prioritization for Legacy Voice over IP
Enabling VoIP Support for TeleSym VoIP
Enabling SVP Optimization for SpectraLink Phones
Restricting Client-To-Client Forwarding Among IP-Only Clients
Security ACL Configuration Scenario
Why Use Keys and Certificates?
PKCS #7, PKCS #10, and PKCS #12 Object Files
Certificates Automatically Generated by MSS
Creating Keys and Certificates
Choosing the Appropriate Certificate Installation Method for Your
Network
Creating Public-Private Key Pairs
Generating Self-Signed Certificates
Installing a Key Pair and Certificate from a PKCS #12 Object File
Creating a CSR and Installing a Certificate from a PKCS #7 Object
File
Installing a CA’s Own Certificate