User Manual

Enterasys X-Pedition User Reference Manual xix
Contents
Assigning Users........................................................................................................401
Defining Views.........................................................................................................402
Defining Targets.......................................................................................................403
Configuring Target Parameters ................................................................................404
Creating Notification Filters.....................................................................................404
Configuring Informs.................................................................................................405
Configuration Notes .................................................................................................406
Assigning Aliases to Interfaces ................................................................................406
Layer-2 Security Filters ..........................................................................................................407
Configuring Layer-2 Address Filters...............................................................................408
Configuring Layer-2 Port-to-Address Lock Filters .........................................................408
Configuring Layer-2 Static-Entry Filters.........................................................................409
Configuring Layer-2 Secure Port Filters .........................................................................409
Monitoring Layer-2 Security Filters................................................................................410
Layer-2 Filter Examples ..................................................................................................411
Example 1: Address Filters.......................................................................................411
Example 2: Secure Ports...........................................................................................412
Layer-3 Security Controls.......................................................................................................413
Access Control Lists (ACLs)...........................................................................................413
Rate Limiting ...................................................................................................................413
Features Available....................................................................................................413
Configuration............................................................................................................414
Output .......................................................................................................................417
Enable / Disable........................................................................................................417
Broadcast Monitor ...........................................................................................................417
Configuration............................................................................................................417
Output .......................................................................................................................418
Enable / Disable........................................................................................................419
Port Mirroring..................................................................................................................419
Features Available....................................................................................................419
Configuration............................................................................................................419
Sample configurations ..............................................................................................420
Output .......................................................................................................................421
Diagrams...................................................................................................................421
Enable / Disable........................................................................................................421
Layer-4 Bridging and Filtering ...............................................................................................422
Creating an IP or IPX VLAN for Layer-4 Bridging........................................................423
Placing the Ports on the Same VLAN .............................................................................423
Enabling Layer-4 Bridging on the VLAN .......................................................................423
Creating ACLs to Specify Selection Criteria for Layer-4 Bridging ................................424
Applying a Layer-4 Bridging ACL to a Port ...................................................................424
Notes ................................................................................................................................425
Chapter 24: QoS Configuration Guide............................................................427
QoS, Layer-2, Layer-3, and Layer-4 Flow Overview.............................................................427
Queuing Policies..............................................................................................................428
Layer-2, Layer-3, and Layer-4 Flow Specification .........................................................428
Layer-2......................................................................................................................428
Layer-3......................................................................................................................429