Contents
xviii
DIGITAL GIGAswitch/Router User Reference Manual
Applying ACLs to Interfaces...................................................................................... 242
Applying ACLs to Services......................................................................................... 243
Using ACLs as Profiles ................................................................................................ 244
Using Profile ACLs with the IP Policy Facility................................................. 245
Using Profile ACLs with the Traffic Rate Limiting Facility............................ 246
Using Profile ACLs with Dynamic NAT ........................................................... 246
Using Profile ACLs with the Port Mirroring Facility ...................................... 247
Using Profile ACLs with the Web Caching Facility......................................... 248
Redirecting HTTP Traffic to Cache Servers ............................................... 248
Preventing Web Objects From Being Cached............................................ 248
Enabling ACL Logging....................................................................................................... 249
Monitoring ACLs................................................................................................................. 250
Chapter 18: Security Configuration Guide .......................................... 251
Security Overview............................................................................................................... 251
Configuring GSR Access Security..................................................................................... 252
Configuring RADIUS .................................................................................................. 252
Monitoring RADIUS............................................................................................. 253
Configuring TACACS ................................................................................................. 253
Monitoring TACACS............................................................................................ 253
Configuring TACACS Plus......................................................................................... 254
Monitoring TACACS Plus ................................................................................... 255
Configuring Passwords............................................................................................... 255
Layer-2 Security Filters....................................................................................................... 255
Configuring Layer-2 Address Filters ........................................................................ 256
Configuring Layer-2 Port-to-Address Lock Filters ................................................. 256
Configuring Layer-2 Static Entry Filters................................................................... 257
Configuring Layer-2 Secure Port Filters ................................................................... 257
Monitoring Layer-2 Security Filters .......................................................................... 258
Layer-2 Filter Examples............................................................................................... 259
Example 1: Address Filters .................................................................................. 259
Static Entries Example................................................................................... 259
Port-to-Address Lock Examples .................................................................. 260
Example 2: Secure Ports ....................................................................................... 260
Layer-3 Access Control Lists (ACLs)................................................................................ 261
Chapter 19: QoS Configuration Guide................................................. 263
QoS & Layer-2/Layer-3/Layer-4 Flow Overview.......................................................... 263
Layer-2 and Layer-3 & Layer-4 Flow Specification................................................. 264
Precedence for Layer-3 Flows .................................................................................... 264
GSR Queuing Policies.................................................................................................. 265
Traffic Prioritization for Layer-2 Flows............................................................................ 265
Configuring Layer-2 QoS ............................................................................................ 266
Traffic Prioritization for Layer-3 & Layer-4 Flows......................................................... 266
Configuring IP QoS Policies ....................................................................................... 266
Setting an IP QoS Policy....................................................................................... 267
Specifying Precedence for an IP QoS Policy ..................................................... 267