Cabletron Systems SmartSwitch User Manual

Page 21

Advertising
background image

SmartSwitch Router User Reference Manual

21

Contents

Enabling IPX RIP...........................................................................................................249
Enabling SAP .................................................................................................................249
Configuring Static Routes............................................................................................249
Configuring Static SAP Table Entries ........................................................................250
Controlling Access to IPX Networks..........................................................................250

Creating an IPX Access Control List ...................................................................250
Creating an IPX Type 20 Access Control List ....................................................251
Creating an IPX SAP Access Control List ..........................................................251
Creating an IPX GNS Access Control List..........................................................251
Creating an IPX RIP Access Control List............................................................252

Monitoring an IPX Network...............................................................................................252
Configuration Examples .....................................................................................................252

Chapter 17: Access Control List Configuration Guide ........................ 255

ACL Basics ............................................................................................................................256

Defining Selection Criteria in ACL Rules..................................................................256
How ACL Rules are Evaluated ...................................................................................257
Implicit Deny Rule ........................................................................................................258
Allowing External Responses to Established TCP Connections ............................259

Creating and Modifying ACLs...........................................................................................260

Editing ACLs Offline ....................................................................................................260
Maintaining ACLs Using the ACL Editor .................................................................261

Using ACLs ...........................................................................................................................262

Applying ACLs to Interfaces.......................................................................................262
Applying ACLs to Services .........................................................................................263
Using ACLs as Profiles.................................................................................................263

Using Profile ACLs with the IP Policy Facility .................................................264
Using Profile ACLs with the Traffic Rate Limiting Facility ............................265
Using Profile ACLs with Dynamic NAT............................................................266
Using Profile ACLs with the Port Mirroring Facility .......................................266
Using Profile ACLs with the Web Caching Facility .........................................267

Redirecting HTTP Traffic to Cache Servers ................................................267
Preventing Web Objects From Being Cached.............................................268

Enabling ACL Logging........................................................................................................268
Monitoring ACLs .................................................................................................................269

Chapter 18: Security Configuration Guide.......................................... 271

Security Overview................................................................................................................271
Configuring SSR Access Security.......................................................................................272

Configuring RADIUS ...................................................................................................272

Monitoring RADIUS..............................................................................................273

Configuring TACACS ..................................................................................................273

Monitoring TACACS.............................................................................................273

Configuring TACACS Plus..........................................................................................274

Monitoring TACACS Plus ....................................................................................274

Configuring Passwords................................................................................................275

Layer-2 Security Filters........................................................................................................275

Configuring Layer-2 Address Filters .........................................................................276
Configuring Layer-2 Port-to-Address Lock Filters ..................................................276

Advertising