Cabletron Systems SmartSwitch Network Router User Manual


 
SmartSwitch Router User Reference Manual 21
Contents
Enabling IPX RIP...........................................................................................................249
Enabling SAP .................................................................................................................249
Configuring Static Routes............................................................................................249
Configuring Static SAP Table Entries ........................................................................250
Controlling Access to IPX Networks..........................................................................250
Creating an IPX Access Control List ...................................................................250
Creating an IPX Type 20 Access Control List ....................................................251
Creating an IPX SAP Access Control List ..........................................................251
Creating an IPX GNS Access Control List..........................................................251
Creating an IPX RIP Access Control List............................................................252
Monitoring an IPX Network...............................................................................................252
Configuration Examples .....................................................................................................252
Chapter 17: Access Control List Configuration Guide ........................ 255
ACL Basics ............................................................................................................................256
Defining Selection Criteria in ACL Rules..................................................................256
How ACL Rules are Evaluated...................................................................................257
Implicit Deny Rule ........................................................................................................258
Allowing External Responses to Established TCP Connections............................259
Creating and Modifying ACLs...........................................................................................260
Editing ACLs Offline....................................................................................................260
Maintaining ACLs Using the ACL Editor.................................................................261
Using ACLs ...........................................................................................................................262
Applying ACLs to Interfaces.......................................................................................262
Applying ACLs to Services .........................................................................................263
Using ACLs as Profiles.................................................................................................263
Using Profile ACLs with the IP Policy Facility .................................................264
Using Profile ACLs with the Traffic Rate Limiting Facility ............................265
Using Profile ACLs with Dynamic NAT............................................................266
Using Profile ACLs with the Port Mirroring Facility .......................................266
Using Profile ACLs with the Web Caching Facility .........................................267
Redirecting HTTP Traffic to Cache Servers................................................267
Preventing Web Objects From Being Cached.............................................268
Enabling ACL Logging........................................................................................................268
Monitoring ACLs .................................................................................................................269
Chapter 18: Security Configuration Guide.......................................... 271
Security Overview................................................................................................................271
Configuring SSR Access Security.......................................................................................272
Configuring RADIUS ...................................................................................................272
Monitoring RADIUS..............................................................................................273
Configuring TACACS ..................................................................................................273
Monitoring TACACS.............................................................................................273
Configuring TACACS Plus..........................................................................................274
Monitoring TACACS Plus....................................................................................274
Configuring Passwords................................................................................................275
Layer-2 Security Filters........................................................................................................275
Configuring Layer-2 Address Filters .........................................................................276
Configuring Layer-2 Port-to-Address Lock Filters ..................................................276