Index – Enterasys Networks 1G58x-09 User Manual

Page 25

Advertising
background image

Contents

Matrix E1 Series (1G58x-09 and 1H582-xx) Configuration Guide

xxiii

14.3.7

Configuring Access Lists............................................................. 14-89
14.3.7.1

show access-lists..................................................... 14-89

14.3.7.2

access-list (standard) .............................................. 14-90

14.3.7.3

access-list (extended).............................................. 14-92

14.3.7.4

ip access-group ....................................................... 14-96

14.3.8

Configuring Denial of Service Prevention ................................... 14-97
14.3.8.1

show HostDos ......................................................... 14-98

14.3.8.2

HostDos................................................................... 14-99

14.3.8.3

clear hostdos-counters .......................................... 14-101

14.3.9

Configuring Flow Setup Throttling (FST) .................................. 14-102
14.3.9.1

show flowlimit ........................................................ 14-103

14.3.9.2

set flowlimit ............................................................ 14-105

14.3.9.3

set flowlimit limit..................................................... 14-106

14.3.9.4

set flowlimit class................................................... 14-108

14.3.9.5

clear flowlimit action .............................................. 14-109

14.3.9.6

set flowlimit shutdown............................................ 14-110

14.3.9.7

set flowlimit notification.......................................... 14-111

14.3.9.8

set flowlimit clearstats............................................ 14-111

14.4

Working with Security Configurations ....................................................... 14-113
14.4.1

Host Access Control Authentication (HACA) ............................ 14-113

14.4.2

802.1X Port Based Network Access Control Overview ............ 14-114

14.4.3

MAC Authentication Overview .................................................. 14-114
14.4.3.1

Authentication Method Sequence.......................... 14-115

14.4.3.2

Concurrent Operation of 802.1X and MAC
Authentication........................................................ 14-115

14.4.4

MAC Authentication Control...................................................... 14-119

14.4.5

RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment....
14-119

INDEX

Advertising
This manual is related to the following products: