beautypg.com

Cabletron Systems SMARTSWITCH ROUTER 9032578-05 User Manual

Page 22

background image

Contents

xxii

SmartSwitch Router User Reference Manual

Editing ACLs Offline ................................................................................................... 264
Maintaining ACLs Using the ACL Editor ................................................................ 265

Using ACLs .......................................................................................................................... 266

Applying ACLs to Interfaces...................................................................................... 266
Applying ACLs to Services......................................................................................... 267
Applying ACLs to Layer-4 Bridging Ports............................................................... 267
Using ACLs as Profiles ................................................................................................ 268

Using Profile ACLs with the IP Policy Facility................................................. 269
Using Profile ACLs with the Traffic Rate Limiting Facility............................ 269
Using Profile ACLs with Dynamic NAT ........................................................... 270
Using Profile ACLs with the Port Mirroring Facility ...................................... 271
Using Profile ACLs with the Web Caching Facility......................................... 271

Redirecting HTTP Traffic to Cache Servers ............................................... 272
Preventing Web Objects From Being Cached............................................ 272

Enabling ACL Logging....................................................................................................... 273
Monitoring ACLs................................................................................................................. 274

Chapter 20: Security Configuration Guide .......................................... 275

Security Overview............................................................................................................... 275
Configuring SSR Access Security...................................................................................... 276

Configuring RADIUS .................................................................................................. 276

Monitoring RADIUS............................................................................................. 277

Configuring TACACS ................................................................................................. 277

Monitoring TACACS............................................................................................ 277

Configuring TACACS Plus......................................................................................... 278

Monitoring TACACS Plus ................................................................................... 279

Configuring Passwords............................................................................................... 279

Layer-2 Security Filters....................................................................................................... 279

Configuring Layer-2 Address Filters ........................................................................ 280
Configuring Layer-2 Port-to-Address Lock Filters ................................................. 281
Configuring Layer-2 Static Entry Filters................................................................... 281
Configuring Layer-2 Secure Port Filters ................................................................... 282
Monitoring Layer-2 Security Filters .......................................................................... 283
Layer-2 Filter Examples............................................................................................... 283

Example 1: Address Filters .................................................................................. 283

Static Entries Example................................................................................... 284
Port-to-Address Lock Examples .................................................................. 284

Example 2 : Secure Ports ...................................................................................... 285

Layer-3 Access Control Lists (ACLs)................................................................................ 285
Layer-4 Bridging and Filtering .......................................................................................... 286

Creating a Port-Based VLAN for Layer-4 Bridging ................................................ 287
Placing the Ports on the Same VLAN ....................................................................... 287
Enabling Layer-4 Bridging on the VLAN ................................................................. 287
Creating ACLs to Specify Selection Criteria for Layer-4 Bridging ....................... 287
Applying a Layer-4 Bridging ACL to a Port ............................................................ 288
Notes .............................................................................................................................. 288

Chapter 21: QoS Configuration Guide................................................. 291

QoS & Layer-2/Layer-3/Layer-4 Flow Overview.......................................................... 291