
vi
Troubleshooting SSL·····························································································································11-6
SSL Handshake Failure·················································································································11-6
12 Public Key Configuration······················································································································12-1
Asymmetric Key Algorithm Overview····································································································12-1
Basic Concepts······························································································································12-1
Key Algorithm Types ·····················································································································12-1
Asymmetric Key Algorithm Applications························································································12-2
Configuring the Local Asymmetric Key Pair··························································································12-2
Creating an Asymmetric Key Pair ·································································································12-2
Displaying or Exporting the Local RSA or DSA Host Public Key ··················································12-3
Destroying an Asymmetric Key Pair······························································································12-3
Configuring the Public Key of a Peer····································································································12-3
Displaying and Maintaining Public Keys ·······························································································12-4
Public Key Configuration Examples······································································································12-5
Configuring the Public Key of a Peer Manually·············································································12-5
Importing the Public Key of a Peer from a Public Key File····························································12-6
13 ACL Overview ········································································································································13-1
Introduction to ACL ·······························································································································13-1
Introduction····································································································································13-1
Application of ACLs on the Switch ································································································13-1
Introduction to IPv4 ACL ·······················································································································13-2
IPv4 ACL Classification ·················································································································13-2
IPv4 ACL Naming··························································································································13-2
IPv4 ACL Match Order ··················································································································13-3
IPv4 ACL Step ·······························································································································13-4
Effective Period of an IPv4 ACL ····································································································13-4
IP Fragments Filtering with IPv4 ACL ···························································································13-4
Introduction to IPv6 ACL ·······················································································································13-5
IPv6 ACL Classification ·················································································································13-5
IPv6 ACL Naming··························································································································13-5
IPv6 ACL Match Order ··················································································································13-5
IPv6 ACL Step ·······························································································································13-6
Effective Period of an IPv6 ACL ····································································································13-6
ACL Application·····································································································································13-6
14 IPv4 ACL Configuration ························································································································14-1
Creating a Time Range·························································································································14-1
Configuration Procedure················································································································14-1
Configuration Example ··················································································································14-2
Configuring a Basic IPv4 ACL···············································································································14-2
Configuration Prerequisites ···········································································································14-2
Configuration Procedure················································································································14-3
Configuration Example ··················································································································14-3
Configuring an Advanced IPv4 ACL ·····································································································14-4
Configuration Prerequisites ···········································································································14-4
Configuration Procedure················································································································14-4
Configuration Example ··················································································································14-5
Configuring an Ethernet Frame Header ACL························································································14-6
Summary of Contents for 4210G Series
Page 459: ...4 8...
Page 493: ...12 1...
Page 968: ...19 6 000f e235 dc71 1 Config static GigabitEthernet 1 0 1 NOAGED 1 mac address es found...