Network Router User Manual
Table Of Contents
- Notices
- Contents
- About This Manual
- Introduction
- Hot Swapping Line Cards and Control Modules
- Bridging Configuration Guide
- Bridging Overview
- VLAN Overview
- Configuring SSR Bridging Functions
- Monitoring Bridging
- Configuration Examples
- SmartTRUNK Configuration Guide
- ATM Configuration Guide
- Packet-over-SONET Configuration Guide
- DHCP Configuration Guide
- IP Routing Configuration Guide
- IP Routing Protocols
- Configuring IP Interfaces and Parameters
- Configuring IP Interfaces to Ports
- Configuring IP Interfaces for a VLAN
- Specifying Ethernet Encapsulation Method
- Configuring Jumbo Frames
- Configuring Address Resolution Protocol (ARP)
- Configuring Reverse Address Resolution Protocol (RARP)
- Configuring DNS Parameters
- Configuring IP Services (ICMP)
- Configuring IP Helper
- Configuring Direct Broadcast
- Configuring Denial of Service (DOS)
- Monitoring IP Parameters
- Configuring Router Discovery
- Configuration Examples
- VRRP Configuration Guide
- RIP Configuration Guide
- OSPF Configuration Guide
- BGP Configuration Guide
- Routing Policy Configuration Guide
- Route Import and Export Policy Overview
- Configuring Simple Routing Policies
- Configuring Advanced Routing Policies
- Multicast Routing Configuration Guide
- IP Policy-Based Forwarding Configuration Guide
- Network Address Translation Configuration Guide
- Web Hosting Configuration Guide
- Overview
- Load Balancing
- Web Caching
- IPX Routing Configuration Guide
- Access Control List Configuration Guide
- Security Configuration Guide
- QoS Configuration Guide
- Performance Monitoring Guide
- RMON Configuration Guide
- LFAP Configuration Guide
- WAN Configuration Guide
- WAN Overview
- Frame Relay Overview
- Configuring Frame Relay Interfaces for the SSR
- Monitoring Frame Relay WAN Ports
- Frame Relay Port Configuration
- Point-to-Point Protocol (PPP) Overview
- Configuring PPP Interfaces
- Monitoring PPP WAN Ports
- PPP Port Configuration
- WAN Configuration Examples
- New Features Supported on Line Cards

Contents
xxii SmartSwitch Router User Reference Manual
Editing ACLs Offline...................................................................................................264
Maintaining ACLs Using the ACL Editor................................................................265
Using ACLs..........................................................................................................................266
Applying ACLs to Interfaces...................................................................................... 266
Applying ACLs to Services......................................................................................... 267
Applying ACLs to Layer-4 Bridging Ports...............................................................267
Using ACLs as Profiles................................................................................................ 268
Using Profile ACLs with the IP Policy Facility.................................................269
Using Profile ACLs with the Traffic Rate Limiting Facility............................ 269
Using Profile ACLs with Dynamic NAT...........................................................270
Using Profile ACLs with the Port Mirroring Facility ......................................271
Using Profile ACLs with the Web Caching Facility......................................... 271
Redirecting HTTP Traffic to Cache Servers...............................................272
Preventing Web Objects From Being Cached............................................ 272
Enabling ACL Logging.......................................................................................................273
Monitoring ACLs.................................................................................................................274
Chapter 20: Security Configuration Guide .......................................... 275
Security Overview...............................................................................................................275
Configuring SSR Access Security...................................................................................... 276
Configuring RADIUS ..................................................................................................276
Monitoring RADIUS.............................................................................................277
Configuring TACACS ................................................................................................. 277
Monitoring TACACS............................................................................................277
Configuring TACACS Plus......................................................................................... 278
Monitoring TACACS Plus................................................................................... 279
Configuring Passwords............................................................................................... 279
Layer-2 Security Filters.......................................................................................................279
Configuring Layer-2 Address Filters ........................................................................ 280
Configuring Layer-2 Port-to-Address Lock Filters................................................. 281
Configuring Layer-2 Static Entry Filters................................................................... 281
Configuring Layer-2 Secure Port Filters................................................................... 282
Monitoring Layer-2 Security Filters ..........................................................................283
Layer-2 Filter Examples............................................................................................... 283
Example 1: Address Filters..................................................................................283
Static Entries Example................................................................................... 284
Port-to-Address Lock Examples.................................................................. 284
Example 2 : Secure Ports......................................................................................285
Layer-3 Access Control Lists (ACLs)................................................................................ 285
Layer-4 Bridging and Filtering.......................................................................................... 286
Creating a Port-Based VLAN for Layer-4 Bridging................................................287
Placing the Ports on the Same VLAN ....................................................................... 287
Enabling Layer-4 Bridging on the VLAN.................................................................287
Creating ACLs to Specify Selection Criteria for Layer-4 Bridging.......................287
Applying a Layer-4 Bridging ACL to a Port............................................................288
Notes.............................................................................................................................. 288
Chapter 21: QoS Configuration Guide................................................. 291
QoS & Layer-2/Layer-3/Layer-4 Flow Overview.......................................................... 291