376
C
HAPTER
19: ACL C
ONFIGURATION
g
Configure the QoS profile
[SW5500]
qos-profile example
[SW5500-qos-profile-example]
traffic-limit inbound ip-group 3000 128
exceed drop
[SW5500-qos-profile-example]
traffic-priority inbound ip-group 3000
dscp 46
[SW5500-qos-profile-example]
quit
h
Set user based mode on the Ethernet1/0/1 port
[SW5500]
interface ethernet1/0/1
[SW5500-Ethernet1/0/1]
qos-profile user-based
ACL Control
Configuration
The Switch supports three major access modes: SNMP (Simple Network Management
Protocol) access, Telnet access and HTTP (Hypertext Transfer Protocol) access. Security
control is achieved at two levels: Connection request control is achieved at the first
level and appropriate ACL configuration ensures that only legal users can be
connected to the Switch. Password authentication is achieved at the second level and
only those connected, with correct passwords, can log successfully onto the Switch.
In this section only the first level security control, ACL configuration, is detailed. See
the Getting Started for the second level control.
Configuring ACL for
Telnet Users
This configuration can filter out malicious or illegal connection request before
password authentication.
Two steps are included in this configuration:
1
Define an ACL
2
Import the ACL to control Telnet users
Defining ACL
Currently only number-based ACLs can be imported, with the number ranging from
2000 to 3999.
Perform the following configuration in System View.
Table 399
Defining Basic ACL
You can define multiple rules for an ACL by using the
rule
command several times.
Operation
Command
Enter basic ACL (System View)
acl number
acl_number
match-order { config |
auto }
Define a sub-rule (Basic ACL
View)
rule [
rule-id
] { permit | deny } [ source {
source_addr wildcard
| any } | fragment |
logging | time-range
name
]*
Delete a sub-rule (Basic ACL
View)
undo rule
rule_id
[ source | fragment | logging
| time-range ]*
Delete an ACL or all ACLs
(System View)
undo acl { number
acl_number
| all }
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...