Network Router User Manual

Table Of Contents
Contents
xxii SmartSwitch Router User Reference Manual
Editing ACLs Offline...................................................................................................264
Maintaining ACLs Using the ACL Editor................................................................265
Using ACLs..........................................................................................................................266
Applying ACLs to Interfaces...................................................................................... 266
Applying ACLs to Services......................................................................................... 267
Applying ACLs to Layer-4 Bridging Ports...............................................................267
Using ACLs as Profiles................................................................................................ 268
Using Profile ACLs with the IP Policy Facility.................................................269
Using Profile ACLs with the Traffic Rate Limiting Facility............................ 269
Using Profile ACLs with Dynamic NAT...........................................................270
Using Profile ACLs with the Port Mirroring Facility ......................................271
Using Profile ACLs with the Web Caching Facility......................................... 271
Redirecting HTTP Traffic to Cache Servers...............................................272
Preventing Web Objects From Being Cached............................................ 272
Enabling ACL Logging.......................................................................................................273
Monitoring ACLs.................................................................................................................274
Chapter 20: Security Configuration Guide .......................................... 275
Security Overview...............................................................................................................275
Configuring SSR Access Security...................................................................................... 276
Configuring RADIUS ..................................................................................................276
Monitoring RADIUS.............................................................................................277
Configuring TACACS ................................................................................................. 277
Monitoring TACACS............................................................................................277
Configuring TACACS Plus......................................................................................... 278
Monitoring TACACS Plus................................................................................... 279
Configuring Passwords............................................................................................... 279
Layer-2 Security Filters.......................................................................................................279
Configuring Layer-2 Address Filters ........................................................................ 280
Configuring Layer-2 Port-to-Address Lock Filters................................................. 281
Configuring Layer-2 Static Entry Filters................................................................... 281
Configuring Layer-2 Secure Port Filters................................................................... 282
Monitoring Layer-2 Security Filters ..........................................................................283
Layer-2 Filter Examples............................................................................................... 283
Example 1: Address Filters..................................................................................283
Static Entries Example................................................................................... 284
Port-to-Address Lock Examples.................................................................. 284
Example 2 : Secure Ports......................................................................................285
Layer-3 Access Control Lists (ACLs)................................................................................ 285
Layer-4 Bridging and Filtering.......................................................................................... 286
Creating a Port-Based VLAN for Layer-4 Bridging................................................287
Placing the Ports on the Same VLAN ....................................................................... 287
Enabling Layer-4 Bridging on the VLAN.................................................................287
Creating ACLs to Specify Selection Criteria for Layer-4 Bridging.......................287
Applying a Layer-4 Bridging ACL to a Port............................................................288
Notes.............................................................................................................................. 288
Chapter 21: QoS Configuration Guide................................................. 291
QoS & Layer-2/Layer-3/Layer-4 Flow Overview.......................................................... 291