User Manual

Contents
xviii Enterasys X-Pedition User Reference Manual
Chapter 22: Access Control List Configuration Guide..................................369
ACL Basics ............................................................................................................................ 370
Defining Selection Criteria in ACL Rules ...................................................................... 370
How ACL Rules are Evaluated....................................................................................... 371
Implicit Deny Rule.......................................................................................................... 372
Allowing External Responses to Established TCP Connections .................................... 373
Creating ACLs........................................................................................................................ 374
In-line Editing.......................................................................................................... 375
Wildcards................................................................................................................. 375
Applying ACLs ...................................................................................................................... 375
Applying ACLs to Interfaces.......................................................................................... 376
Applying ACLs to Services ............................................................................................ 377
Applying ACLs to Layer-4 Bridging Ports..................................................................... 377
Using ACLs as Profiles................................................................................................... 377
Using Profile ACLs with the IP Policy Facility ...................................................... 378
Using Profile ACLs with the Traffic Rate Limiting Facility................................... 379
Using Profile ACLs with Dynamic NAT ................................................................ 380
Using Profile ACLs with the Port Mirroring Facility.............................................. 380
Using Profile ACLs with the Web Caching Facility ............................................... 381
Modifying ACLs .................................................................................................................... 382
Maintaining ACLs Using the ACL Editor...................................................................... 382
Editing ACLs Offline...................................................................................................... 383
Enabling ACL Logging.......................................................................................................... 384
Monitoring ACLs................................................................................................................... 385
Chapter 23: Security Configuration Guide.....................................................387
Security Overview.................................................................................................................. 387
Configuring X-Pedition Access Security ............................................................................... 388
RADIUS..........................................................................................................................388
Configuring RADIUS.............................................................................................. 388
Monitoring RADIUS ............................................................................................... 389
Configuring Passwords............................................................................................ 389
TACACS Plus................................................................................................................. 390
Configuring TACACS Plus ..................................................................................... 390
Monitoring TACACS Plus....................................................................................... 391
Configuring Passwords............................................................................................ 391
Password Policy Management ........................................................................................ 392
Single-User Mode.................................................................................................... 392
Multi-User Mode ..................................................................................................... 393
SNMP.............................................................................................................................. 394
SNMPv1, SNMPv2c, and SNMPv3 Agent Overview............................................. 394
Security .................................................................................................................... 394
Access Control......................................................................................................... 395
Reliability................................................................................................................. 396
Supported SNMPv3 MIBs....................................................................................... 396
Configuration Overview ................................................................................................. 398
Creating Users.......................................................................................................... 398
Creating Communities ............................................................................................. 399
Creating Groups....................................................................................................... 401