Owner's Manual

Contents 23
How Does the Authentication Server Assign
DiffServ Filters?
. . . . . . . . . . . . . . . . . . . 489
What is the Internal Authentication Server?. . . . 489
Default 802.1X Values
. . . . . . . . . . . . . . . . 490
Configuring IEEE 802.1X (Web) . . . . . . . . . . . 491
Configuring IEEE 802.1X (CLI) . . . . . . . . . . . . 499
Configuring Internal Authentication Server
Users
. . . . . . . . . . . . . . . . . . . . . . . . 504
IEEE 802.1X Configuration Examples . . . . . . . . 504
Port Security (Port-MAC Locking)
. . . . . . . . . . . . 518
Default 802.1X Values
. . . . . . . . . . . . . . . . 518
Configuring Port Security (CLI)
. . . . . . . . . . . 521
Denial of Service
. . . . . . . . . . . . . . . . . . . . 522
20 Configuring Access Control Lists . . . . . 523
ACL Overview . . . . . . . . . . . . . . . . . . . . . . 523
What Are MAC ACLs?
. . . . . . . . . . . . . . . 524
What Are IP ACLs? . . . . . . . . . . . . . . . . . 525
What Is the ACL Redirect Function?
. . . . . . . . 525
What Is the ACL Mirror Function? . . . . . . . . . 525
What Is ACL Logging . . . . . . . . . . . . . . . . 526
What Are Time-Based ACLs?
. . . . . . . . . . . . 526
What Are the ACL Limitations? . . . . . . . . . . . 527
How Are ACLs Configured?
. . . . . . . . . . . . . 528
Preventing False ACL Matches
. . . . . . . . . . . 528
Configuring ACLs (Web)
. . . . . . . . . . . . . . . . . 530
IP ACL Configuration
. . . . . . . . . . . . . . . . 530
IP ACL Rule Configuration
. . . . . . . . . . . . . 532
MAC ACL Configuration . . . . . . . . . . . . . . 534
MAC ACL Rule Configuration . . . . . . . . . . . . 536
IPv6 ACL Configuration . . . . . . . . . . . . . . . 537