Cabletron Systems 9032578-02 Router User Manual


 
Contents
12 SmartSwitch Router User Reference Manual
IPX Addresses............................................................................................................... 153
Configuring IPX Interfaces and Parameters.................................................................... 154
Configure IPX Addresses to Ports............................................................................. 154
Configure IPX Interfaces for a VLAN ....................................................................... 154
Specify IPX Encapsulation Method........................................................................... 154
Configure IPX Routing ....................................................................................................... 155
Enable IPX RIP.............................................................................................................. 155
Enable SAP.................................................................................................................... 155
Configure Static Routes............................................................................................... 155
Configure Static SAP Table Entries ........................................................................... 156
Control Access to IPX Networks................................................................................ 156
Create an IPX Access Control List...................................................................... 156
Create an IPX Type 20 Access Control List....................................................... 157
Create an IPX SAP Access Control List ............................................................. 157
Create an IPX GNS Access Control List............................................................. 157
Create an IPX RIP Access Control List............................................................... 158
Monitor an IPX Network.................................................................................................... 158
Configuration Examples..................................................................................................... 158
Chapter 10: Security Configuration Guide .......................................... 161
Security Overview...............................................................................................................161
Configuring SSR Access Security...................................................................................... 162
Configure RADIUS ...................................................................................................... 162
Monitor RADIUS .................................................................................................. 162
Configure TACACS ..................................................................................................... 162
Monitor TACACS ................................................................................................. 163
Configure TACACS Plus............................................................................................. 163
Monitor TACACS Plus......................................................................................... 163
Configure Passwords................................................................................................... 164
Layer-2 Security Filters....................................................................................................... 164
Configuring Layer-2 Address Filters ........................................................................ 165
Configuring Layer-2 Port-to-Address Lock Filters ................................................. 165
Configuring Layer-2 Static Entry Filters................................................................... 166
Configuring Layer-2 Secure Port Filters ................................................................... 166
Monitor Layer-2 Security Filters................................................................................ 167
Layer-2 Filter Examples............................................................................................... 168
Example 1: Address Filters.................................................................................. 168
Static Entries Example................................................................................... 168
Port-to-Address Lock Examples.................................................................. 169
Example 2 : Secure Ports...................................................................................... 169
Layer-3 Access Control Lists (ACLs)................................................................................ 170
Layer-3 & Layer-4 Traffic Filters (Access Control List).......................................... 170
Anatomy of an ACL Rule............................................................................................ 170
Ordering of ACL Rules................................................................................................ 171
Implicit Deny Rule....................................................................................................... 172
Applying ACLs to Interfaces...................................................................................... 173
Applying ACLs to Services......................................................................................... 174
ACL Logging ................................................................................................................ 174
Maintaining ACLs Offline Using TFTP or RCP....................................................... 175
Maintaining ACLs Using the ACL Editor ................................................................ 176