Cabletron Systems SmartSwitch Router 9032578-02 User Manual

Page 12

Advertising
background image

Contents

12

SmartSwitch Router User Reference Manual

IPX Addresses............................................................................................................... 153

Configuring IPX Interfaces and Parameters.................................................................... 154

Configure IPX Addresses to Ports ............................................................................. 154
Configure IPX Interfaces for a VLAN ....................................................................... 154
Specify IPX Encapsulation Method ........................................................................... 154

Configure IPX Routing ....................................................................................................... 155

Enable IPX RIP.............................................................................................................. 155
Enable SAP .................................................................................................................... 155
Configure Static Routes............................................................................................... 155
Configure Static SAP Table Entries ........................................................................... 156
Control Access to IPX Networks................................................................................ 156

Create an IPX Access Control List ...................................................................... 156
Create an IPX Type 20 Access Control List ....................................................... 157
Create an IPX SAP Access Control List ............................................................. 157
Create an IPX GNS Access Control List............................................................. 157
Create an IPX RIP Access Control List............................................................... 158

Monitor an IPX Network.................................................................................................... 158
Configuration Examples..................................................................................................... 158

Chapter 10: Security Configuration Guide .......................................... 161

Security Overview............................................................................................................... 161
Configuring SSR Access Security...................................................................................... 162

Configure RADIUS ...................................................................................................... 162

Monitor RADIUS .................................................................................................. 162

Configure TACACS ..................................................................................................... 162

Monitor TACACS ................................................................................................. 163

Configure TACACS Plus............................................................................................. 163

Monitor TACACS Plus......................................................................................... 163

Configure Passwords................................................................................................... 164

Layer-2 Security Filters....................................................................................................... 164

Configuring Layer-2 Address Filters ........................................................................ 165
Configuring Layer-2 Port-to-Address Lock Filters ................................................. 165
Configuring Layer-2 Static Entry Filters................................................................... 166
Configuring Layer-2 Secure Port Filters ................................................................... 166
Monitor Layer-2 Security Filters ................................................................................ 167
Layer-2 Filter Examples............................................................................................... 168

Example 1: Address Filters .................................................................................. 168

Static Entries Example................................................................................... 168
Port-to-Address Lock Examples .................................................................. 169

Example 2 : Secure Ports ...................................................................................... 169

Layer-3 Access Control Lists (ACLs)................................................................................ 170

Layer-3 & Layer-4 Traffic Filters (Access Control List) .......................................... 170
Anatomy of an ACL Rule............................................................................................ 170
Ordering of ACL Rules................................................................................................ 171
Implicit Deny Rule ....................................................................................................... 172
Applying ACLs to Interfaces...................................................................................... 173
Applying ACLs to Services......................................................................................... 174
ACL Logging ................................................................................................................ 174
Maintaining ACLs Offline Using TFTP or RCP....................................................... 175
Maintaining ACLs Using the ACL Editor ................................................................ 176

Advertising