Cabletron Systems SSIM-R8-02 Spécifications Page 17

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 394
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 16
Enterasys Xpedition User Reference Manual xvii
Contents
Using Profile ACLs with the Port Mirroring Facility.......................................291
Using Profile ACLs with the Web Caching Facility .........................................292
Redirecting HTTP Traffic to Cache Servers................................................292
Preventing Web Objects From Being Cached.............................................292
Enabling ACL Logging........................................................................................................293
Monitoring ACLs.................................................................................................................294
Chapter 22: Security Configuration Guide.....................................................295
Security Overview................................................................................................................295
Configuring XP Access Security........................................................................................295
Configuring RADIUS...................................................................................................296
Monitoring RADIUS..............................................................................................296
Configuring TACACS..................................................................................................297
Monitoring TACACS.............................................................................................297
Configuring TACACS Plus..........................................................................................297
Monitoring TACACS Plus....................................................................................299
Configuring Passwords................................................................................................299
Layer-2 Security Filters........................................................................................................299
Configuring Layer-2 Address Filters.........................................................................300
Configuring Layer-2 Port-to-Address Lock Filters..................................................301
Configuring Layer-2 Static Entry Filters....................................................................301
Configuring Layer-2 Secure Port Filters....................................................................302
Monitoring Layer-2 Security Filters...........................................................................303
Layer-2 Filter Examples ...............................................................................................303
Example 1: Address Filters...................................................................................303
Static Entries Example ...................................................................................304
Port-to-Address Lock Examples...................................................................304
Example 2: Secure Ports........................................................................................305
Layer-3 Access Control Lists (ACLs).................................................................................305
Layer-4 Bridging and Filtering...........................................................................................306
Creating a Port-Based VLAN for Layer-4 Bridging.................................................307
Placing the Ports on the Same VLAN........................................................................307
Enabling Layer-4 Bridging on the VLAN..................................................................307
Creating ACLs to Specify Selection Criteria for Layer-4 Bridging........................308
Applying a Layer-4 Bridging ACL to a Port.............................................................308
Notes...............................................................................................................................309
Chapter 23: QoS Configuration Guide............................................................311
QoS & Layer-2/Layer-3/Layer-4 Flow Overview..........................................................311
Layer-2 and Layer-3 & Layer-4 Flow Specification..................................................312
Precedence for Layer-3 Flows.....................................................................................313
XP Queuing Policies.....................................................................................................313
Traffic Prioritization for Layer-2 Flows............................................................................313
Configuring Layer-2 QoS.............................................................................................314
802.1p Priority Mapping..............................................................................................314
Creating and Applying a New Priority Map.....................................................315
Removing or Disabling Per-Port Priority Map..................................................315
Displaying Priority Map Information.................................................................316
Traffic Prioritization for Layer-3 & Layer-4 Flows..........................................................316
Vue de la page 16
1 2 ... 12 13 14 15 16 17 18 19 20 21 22 ... 393 394

Commentaires sur ces manuels

Pas de commentaire