Chapter 13: Configuring Security on the SSR
212
CoreWatch User’s Manual
After you finish defining all of an ACL’s rules, Configuration Expert adds the ACL to the
IP Security object. Configuration Expert also adds a separate object for each rule and
places this list of rules in the ACL object.
The rule numbers displayed in an ACL’s list of rules, are automatically assigned by
Configuration Expert. A rule’s number is included in the Rule # box of the IP ACL Rule
panel when you are defining that rule.
Setting IPX Security
You set security on an IPX network by configuring ACLs that you will apply to IPX
interfaces. When setting IPX security, you can configure ACLs that perform the following
functions:
•
Permit or deny traffic from one computer to another. To set up this type of ACL, you
configure an IPX ACL.
•
Set up RIP filters, which permit or deny IPX RIP network advertisements. To set up
such filters, you configure an IPX RIP ACL.
•
Set up SAP filters, which permit or deny IPX SAP service advertisements. To set up
such filters, you configure an IPX SAP ACL.
Separate discussions on configuring the different types of ACLs for an IPX network
follow.
Configuring an IPX ACL
Configure an IPX ACL to permit or deny traffic from one computer to another. To
configure an IPX ACL:
1.
Start Configuration Expert if you have not already done so.
2.
Open the configuration file you want to modify and then double-click that file’s
Security Configuration object.
3.
Double-click the IPX Security object.
4.
Click the Configure New IPX Security Profile object.
Configuration Expert opens the IPX Security wizard.
Summary of Contents for CoreWatch
Page 1: ...CoreWatch User s Manual 9032564 04...
Page 2: ...Notice 2 CoreWatch User s Manual...
Page 20: ...Preface 20 CoreWatch User s Manual...
Page 64: ...Chapter 5 Changing System Settings 64 CoreWatch User s Manual...
Page 86: ...Chapter 6 Configuring SSR Bridging 86 CoreWatch User s Manual...
Page 106: ...Chapter 7 Configuring VLANs on the SSR 106 CoreWatch User s Manual...
Page 206: ...Chapter 12 Configuring QoS on the SSR 206 CoreWatch User s Manual...
Page 246: ...Chapter 13 Configuring Security on the SSR 246 CoreWatch User s Manual...
Page 363: ...CoreWatch User s Manual 363 Chapter 16 Configuring Routing Policies on the SSR 9 Click OK...
Page 364: ...Chapter 16 Configuring Routing Policies on the SSR 364 CoreWatch User s Manual...
Page 370: ...Chapter 17 Checking System Status 370 CoreWatch User s Manual...
Page 390: ...Chapter 18 Monitoring Real Time Performance 390 CoreWatch User s Manual...
Page 396: ...Chapter 19 Checking the Status of Bridge Tables 396 CoreWatch User s Manual...
Page 430: ...Chapter 20 Checking the Status of Routing Tables 430 CoreWatch User s Manual...
Page 442: ...Chapter 22 Obtaining Reports 442 CoreWatch User s Manual...
Page 456: ...Appendix B CoreWatch Menus 456 CoreWatch User s Manual...