Specifications

xxvi
bypass-list range ............................................................................................................................23-10
hosts redirect range........................................................................................................................23-10
ip twcb redirect out ......................................................................................................................... 23-11
show ip twcb wcserverfarm ............................................................................................................23-12
show ip twcb webcache..................................................................................................................23-13
show ip twcb conns ........................................................................................................................23-13
show ip twcb stats ..........................................................................................................................23-14
clear ip twcb statistics.....................................................................................................................23-14
show limits ......................................................................................................................................23-15
set router limits (TWCB) .................................................................................................................23-15
show router limits (TWCB)..............................................................................................................23-16
clear router limits (TWCB) ..............................................................................................................23-17
TWCB Configuration Example .................................................................................................................... 23-19
Configure the s1Server Server Farm ................................................................................................... 23-19
Configure the s2Server Server Farm ................................................................................................... 23-20
Configure the cache1 Web Cache ....................................................................................................... 23-21
Configure the Switch and Router ......................................................................................................... 23-21
Chapter 24: Security Configuration
Overview of Security Methods ...................................................................................................................... 24-1
Configuring MAC Locking ............................................................................................................................. 24-2
Purpose .................................................................................................................................................. 24-2
Commands ............................................................................................................................................. 24-2
show maclock ................................................................................................................................... 24-2
show maclock stations......................................................................................................................24-4
set maclock enable........................................................................................................................... 24-5
set maclock disable .......................................................................................................................... 24-5
set maclock.......................................................................................................................................24-6
set maclock firstarrival ...................................................................................................................... 24-7
set maclock move.............................................................................................................................24-7
clear maclock firstarrival ...................................................................................................................24-8
set maclock static ............................................................................................................................. 24-8
clear maclock static ..........................................................................................................................24-9
set maclock trap ............................................................................................................................... 24-9
clear maclock..................................................................................................................................24-10
Configuring Secure Shell (SSH) ................................................................................................................. 24-11
Purpose ................................................................................................................................................ 24-11
Commands ........................................................................................................................................... 24-11
show ssh state................................................................................................................................24-11
set ssh ............................................................................................................................................24-11
set ssh hostkey...............................................................................................................................24-12
show router ssh ..............................................................................................................................24-12
set router ssh..................................................................................................................................24-13
clear router ssh...............................................................................................................................24-13
Configuring Access Lists ............................................................................................................................ 24-15
Purpose ................................................................................................................................................ 24-15
Commands ........................................................................................................................................... 24-15
show access-lists............................................................................................................................24-15
access-list (standard) .....................................................................................................................24-16
access-list (extended).....................................................................................................................24-17
ip access-group ..............................................................................................................................24-20
Configuring Denial of Service (DoS) Prevention ........................................................................................ 24-22
Purpose ................................................................................................................................................ 24-22
Commands ........................................................................................................................................... 24-22
show hostdos..................................................................................................................................24-22