10
M
AKING
Y
OUR
N
ETWORK
S
ECURE
Limiting Management Access by IP Address
71
Securing Access to the Web Interface
72
Getting a Digital Certificate
72
Securing Access to the Command Line Interface
73
Access Control Lists
73
How Access Control List Rules Work
74
Port Security
74
What is Network Login?
75
How Network Login Works
75
Important Considerations
76
What is Switch Management Login?
77
Benefits of RADIUS Authentication
77
How RADIUS Authentication Works
78
Important Considerations
79
What is RADIUS?
80
11
IP R
OUTING
What is Routing?
82
Routing in a Subnetworked Environment
82
What is IP Routing?
83
Benefits of IP Routing
84
IP Routing Concepts
84
Router Interfaces
84
Routing Tables
85
Layer 3 Switching
86
Multiple IP Interfaces per VLAN
87
Implementing IP Routing
88
Configuring IP VLANs
88
Establishing IP Interfaces
88
IP Routing Protocols
90
Routing Information Protocol (RIP)
90
User Datagram Protocol (UDP) Helper
93
Address Resolution Protocol (ARP)
94
ARP Proxy
96
Internet Control Message Protocol (ICMP)
97
Advanced IP Routing Options
97
Summary of Contents for SUPERSTACK 3 3250
Page 8: ......
Page 20: ...20 CHAPTER 1 SWITCH FEATURES OVERVIEW...
Page 43: ...How STP Works 43 Figure 9 STP configurations...
Page 54: ...54 CHAPTER 6 USING TRAFFIC MANAGEMENT...
Page 66: ...66 CHAPTER 8 SETTING UP VIRTUAL LANS...
Page 70: ...70 CHAPTER 9 USING AUTOMATIC IP CONFIGURATION...
Page 98: ...98 CHAPTER 11 IP ROUTING...
Page 102: ...102 APPENDIX A CONFIGURATION RULES...
Page 106: ...106 APPENDIX B NETWORK CONFIGURATION EXAMPLES...
Page 132: ...132 INDEX...