11.08.2013 Views

User Reference Manual.book

User Reference Manual.book

User Reference Manual.book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents<br />

Chapter 22: Access Control List Configuration Guide..................................371<br />

ACL Basics ............................................................................................................................ 372<br />

Defining Selection Criteria in ACL Rules ...................................................................... 372<br />

How ACL Rules are Evaluated....................................................................................... 373<br />

Implicit Deny Rule.......................................................................................................... 374<br />

Allowing External Responses to Established TCP Connections .................................... 375<br />

Creating ACLs........................................................................................................................ 376<br />

In-line Editing .......................................................................................................... 377<br />

Wildcards ................................................................................................................. 377<br />

Applying ACLs ...................................................................................................................... 377<br />

Applying ACLs to Interfaces .......................................................................................... 378<br />

Applying ACLs to Services ............................................................................................ 379<br />

Applying ACLs to Layer-4 Bridging Ports..................................................................... 379<br />

Using ACLs as Profiles................................................................................................... 379<br />

Using Profile ACLs with the IP Policy Facility ...................................................... 380<br />

Using Profile ACLs with the Traffic Rate Limiting Facility................................... 381<br />

Using Profile ACLs with Dynamic NAT ................................................................ 382<br />

Using Profile ACLs with the Port Mirroring Facility.............................................. 382<br />

Using Profile ACLs with the Web Caching Facility ............................................... 383<br />

Modifying ACLs .................................................................................................................... 384<br />

Maintaining ACLs Using the ACL Editor ...................................................................... 384<br />

Editing ACLs Offline...................................................................................................... 385<br />

Enabling ACL Logging.......................................................................................................... 386<br />

Monitoring ACLs ................................................................................................................... 387<br />

Chapter 23: Security Configuration Guide .....................................................389<br />

Security Overview.................................................................................................................. 389<br />

Configuring X-Pedition Access Security ............................................................................... 390<br />

RADIUS..........................................................................................................................390<br />

Configuring RADIUS .............................................................................................. 390<br />

Monitoring RADIUS ............................................................................................... 391<br />

Configuring Passwords ............................................................................................ 391<br />

TACACS Plus................................................................................................................. 392<br />

Configuring TACACS Plus ..................................................................................... 392<br />

Monitoring TACACS Plus....................................................................................... 393<br />

Configuring Passwords ............................................................................................ 393<br />

Password Policy Management ........................................................................................ 394<br />

Single-<strong>User</strong> Mode .................................................................................................... 394<br />

Multi-<strong>User</strong> Mode ..................................................................................................... 395<br />

SNMP.............................................................................................................................. 396<br />

SNMPv1, SNMPv2c, and SNMPv3 Agent Overview............................................. 396<br />

Security .................................................................................................................... 396<br />

Access Control......................................................................................................... 397<br />

Reliability................................................................................................................. 398<br />

Supported SNMPv3 MIBs ....................................................................................... 398<br />

Configuration Overview ................................................................................................. 400<br />

Creating <strong>User</strong>s.......................................................................................................... 400<br />

Creating Communities ............................................................................................. 401<br />

Creating Groups....................................................................................................... 403<br />

xviii Enterasys X-Pedition <strong>User</strong> <strong>Reference</strong> <strong>Manual</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!