
Enterasys Xpedition User Reference Manual xvii
Contents
Using Profile ACLs with the Port Mirroring Facility.......................................291
Using Profile ACLs with the Web Caching Facility .........................................292
Redirecting HTTP Traffic to Cache Servers................................................292
Preventing Web Objects From Being Cached.............................................292
Enabling ACL Logging........................................................................................................293
Monitoring ACLs.................................................................................................................294
Chapter 22: Security Configuration Guide.....................................................295
Security Overview................................................................................................................295
Configuring XP Access Security........................................................................................295
Configuring RADIUS...................................................................................................296
Monitoring RADIUS..............................................................................................296
Configuring TACACS..................................................................................................297
Monitoring TACACS.............................................................................................297
Configuring TACACS Plus..........................................................................................297
Monitoring TACACS Plus....................................................................................299
Configuring Passwords................................................................................................299
Layer-2 Security Filters........................................................................................................299
Configuring Layer-2 Address Filters.........................................................................300
Configuring Layer-2 Port-to-Address Lock Filters..................................................301
Configuring Layer-2 Static Entry Filters....................................................................301
Configuring Layer-2 Secure Port Filters....................................................................302
Monitoring Layer-2 Security Filters...........................................................................303
Layer-2 Filter Examples ...............................................................................................303
Example 1: Address Filters...................................................................................303
Static Entries Example ...................................................................................304
Port-to-Address Lock Examples...................................................................304
Example 2: Secure Ports........................................................................................305
Layer-3 Access Control Lists (ACLs).................................................................................305
Layer-4 Bridging and Filtering...........................................................................................306
Creating a Port-Based VLAN for Layer-4 Bridging.................................................307
Placing the Ports on the Same VLAN........................................................................307
Enabling Layer-4 Bridging on the VLAN..................................................................307
Creating ACLs to Specify Selection Criteria for Layer-4 Bridging........................308
Applying a Layer-4 Bridging ACL to a Port.............................................................308
Notes...............................................................................................................................309
Chapter 23: QoS Configuration Guide............................................................311
QoS & Layer-2/Layer-3/Layer-4 Flow Overview..........................................................311
Layer-2 and Layer-3 & Layer-4 Flow Specification..................................................312
Precedence for Layer-3 Flows.....................................................................................313
XP Queuing Policies.....................................................................................................313
Traffic Prioritization for Layer-2 Flows............................................................................313
Configuring Layer-2 QoS.............................................................................................314
802.1p Priority Mapping..............................................................................................314
Creating and Applying a New Priority Map.....................................................315
Removing or Disabling Per-Port Priority Map..................................................315
Displaying Priority Map Information.................................................................316
Traffic Prioritization for Layer-3 & Layer-4 Flows..........................................................316
Commentaires sur ces manuels