Network Router User Manual
Table Of Contents
- Notices
- Contents
- About This Manual
- Introduction
- Hot Swapping Line Cards and Control Modules
- Bridging Configuration Guide
- Bridging Overview
- VLAN Overview
- Configuring SSR Bridging Functions
- Monitoring Bridging
- Configuration Examples
- SmartTRUNK Configuration Guide
- ATM Configuration Guide
- Packet-over-SONET Configuration Guide
- DHCP Configuration Guide
- IP Routing Configuration Guide
- IP Routing Protocols
- Configuring IP Interfaces and Parameters
- Configuring IP Interfaces to Ports
- Configuring IP Interfaces for a VLAN
- Specifying Ethernet Encapsulation Method
- Configuring Jumbo Frames
- Configuring Address Resolution Protocol (ARP)
- Configuring Reverse Address Resolution Protocol (RARP)
- Configuring DNS Parameters
- Configuring IP Services (ICMP)
- Configuring IP Helper
- Configuring Direct Broadcast
- Configuring Denial of Service (DOS)
- Monitoring IP Parameters
- Configuring Router Discovery
- Configuration Examples
- VRRP Configuration Guide
- RIP Configuration Guide
- OSPF Configuration Guide
- BGP Configuration Guide
- Routing Policy Configuration Guide
- Route Import and Export Policy Overview
- Configuring Simple Routing Policies
- Configuring Advanced Routing Policies
- Multicast Routing Configuration Guide
- IP Policy-Based Forwarding Configuration Guide
- Network Address Translation Configuration Guide
- Web Hosting Configuration Guide
- Overview
- Load Balancing
- Web Caching
- IPX Routing Configuration Guide
- Access Control List Configuration Guide
- Security Configuration Guide
- QoS Configuration Guide
- Performance Monitoring Guide
- RMON Configuration Guide
- LFAP Configuration Guide
- WAN Configuration Guide
- WAN Overview
- Frame Relay Overview
- Configuring Frame Relay Interfaces for the SSR
- Monitoring Frame Relay WAN Ports
- Frame Relay Port Configuration
- Point-to-Point Protocol (PPP) Overview
- Configuring PPP Interfaces
- Monitoring PPP WAN Ports
- PPP Port Configuration
- WAN Configuration Examples
- New Features Supported on Line Cards

SmartSwitch Router User Reference Manual 285
Chapter 20: Security Configuration Guide
Note:
If the consultant’s MAC is detected on a different port, all of its traffic will be
blocked.
Example 2 : Secure Ports
Source secure port: To block all engineers on port 1 from accessing all other ports, enter
the following command:
To allow ONLY the engineering manager access to the engineering servers, you must
"punch" a hole through the secure-port wall. A "source static-entry" overrides a "source
secure port".
Destination secure port: To block access to all file servers on all ports from port et.1.1 use
the following command:
To allow all engineers access to the engineering servers, you must "punch" a hole through
the secure-port wall. A "dest static-entry" overrides a "dest secure port".
Layer-3 Access Control Lists (ACLs)
Access Control Lists (ACLs) allow you to restrict Layer-3/4 traffic going through the SSR.
Each ACL consists of one or more rules describing a particular type of IP or IPX traffic. An
ACL can be simple, consisting of only one rule, or complicated with many rules. Each rule
tells the router to either permit or deny the packet that matches the rule's packet
description.
For information about defining and using ACLs on the SSR, see “Access Control List
Configuration Guide” on page 259.
filters add secure-port name engineers direction source vlan 1
in-port-list et.1.1
filters add static-entry name eng-mgr source-mac 080060:123456 vlan 1
in-port-list et.1.1 out-port-list et.1.2 restriction allow
filters add secure-port name engineers direction dest vlan 1
in-port-list et.1.1
filters add static-entry name eng-server dest-mac 080060:abcdef vlan 1
in-port-list et.1.1 out-port-list et.1.2 restriction allow