144
C
HAPTER
7: ACL C
ONFIGURATION
Networking Diagram
Figure 39
QoS Configuration Example
Configuration Procedure
Define port mirroring, with monitoring port being Ethernet3/0/8.
[4500-Ethernet3/0/8]
monitor-port
[4500-Ethernet3/0/1]
mirroring-port both
ACL Control
Configuration
The Switch provides three modes for users to access devices remotely:
■
TELNET access
■
Security shell (SSH) access
■
Simple network management protocol (SNMP) access
The Switch provides security control features and controls the three access modes,
consequently preventing illegal users from logging into and accessing switches.
Security control can be divided into the following two levels:
■
Level 1 – User connection control. Configured access control list (ACL) filters
login users so that only legal users can be connected to the switch.
■
Level 2: User password authentication. Before logging into the switch, the
users connected to the switch must pass the password authentication.
This chapter describes how to configure level 1 security control, that is how to
configure ACLs for login users. For the level 2 security configuration, refer to
“User
Interface Configuration”
.
TELNET/SSH User ACL
Configuration
Before login users perform password authentication, the ACLs configured for
TELNET or SSH users filter some malicious or illegal connection request,
consequently assuring device security.
Configuration Prerequisites
You have correctly configured to log into switches in the TELNET or SSH mode.
Server
E3/0/2
E3/0/1
E3/0/8
Summary of Contents for Switch 4500 26-Port
Page 16: ...14 ABOUT THIS GUIDE...
Page 58: ...56 CHAPTER 2 PORT OPERATION...
Page 104: ...102 CHAPTER 5 NETWORK PROTOCOL OPERATION...
Page 130: ...128 CHAPTER 6 IP ROUTING PROTOCOL OPERATION...
Page 154: ...152 CHAPTER 7 ACL CONFIGURATION...
Page 228: ...226 CHAPTER 11 802 1X CONFIGURATION...
Page 250: ...248 CHAPTER 14 DEVICE MANAGEMENT...
Page 280: ...278 CHAPTER 15 SYSTEM MAINTENANCE AND DEBUGGING...
Page 312: ...310 CHAPTER 18 NTP CONFIGURATION...
Page 340: ...338 CHAPTER 19 SSH TERMINAL SERVICES...
Page 350: ...348 CHAPTER 20 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 388: ...386 APPENDIX B RADIUS SERVER AND RADIUS CLIENT SETUP...