CoreWatch User’s Manual
243
Chapter 13: Configuring Security on the SSR
Adding or Modifying ACL Rules
To add a rule to an existing ACL or modify an ACL’s rule:
1.
Start Configuration Expert if you have not already done so.
2.
Open the configuration file you want to modify and then double-click that file’s
Security Configuration object.
3.
Do one of the following:
–
Double-click the IP Security object and then the IP ACLs object if you are
modifying an IP ACL.
–
Double-click the IPX Security object if you are modifying an IPX ACL. Then
double-click the object (IPX ACLs, IPX RIP ACLs, or IPX SAP ACLs) appropriate
for the type of IPX ACL you are modifying.
4.
In the list of ACLs that appears, double-click the ACL you want to modify. Then click
one of the following:
–
The rule you want to modify.
–
The Create New Rule object. Click this object if you want to add a new rule.
5.
Edit the
ACL Rule Definition
dialog box that appears.
The dialog box’s rule options are the same as those you specify when creating a new
ACL. For details on an ACL’s rule definition, see the section that discusses creating that
type of ACL.
6.
Click
OK
.
Modifying Layer-2 Security Filters
You can modify the settings of Layer-2 security filters and change their port bindings.
Separate discussions on performing these tasks follow.
Modifying a Filter’s Settings
To modify a filter’s settings:
1.
Start Configuration Expert if you have not already done so.
2.
Open the configuration file you want to modify and then double-click that file’s
Security Configuration object.
3.
Double-click the L2 Security object.
4.
Double-click the object appropriate for the type of filter you want to edit (L2 Address
Filters, L2 Port Address Lock Filters, L2 Secure Port Filters, or L2 Static Entries).
Summary of Contents for SSR-GLX19-02
Page 1: ...CoreWatch User s Manual 9032564 04...
Page 2: ...Notice 2 CoreWatch User s Manual...
Page 20: ...Preface 20 CoreWatch User s Manual...
Page 64: ...Chapter 5 Changing System Settings 64 CoreWatch User s Manual...
Page 86: ...Chapter 6 Configuring SSR Bridging 86 CoreWatch User s Manual...
Page 106: ...Chapter 7 Configuring VLANs on the SSR 106 CoreWatch User s Manual...
Page 206: ...Chapter 12 Configuring QoS on the SSR 206 CoreWatch User s Manual...
Page 246: ...Chapter 13 Configuring Security on the SSR 246 CoreWatch User s Manual...
Page 363: ...CoreWatch User s Manual 363 Chapter 16 Configuring Routing Policies on the SSR 9 Click OK...
Page 364: ...Chapter 16 Configuring Routing Policies on the SSR 364 CoreWatch User s Manual...
Page 370: ...Chapter 17 Checking System Status 370 CoreWatch User s Manual...
Page 390: ...Chapter 18 Monitoring Real Time Performance 390 CoreWatch User s Manual...
Page 396: ...Chapter 19 Checking the Status of Bridge Tables 396 CoreWatch User s Manual...
Page 430: ...Chapter 20 Checking the Status of Routing Tables 430 CoreWatch User s Manual...
Page 442: ...Chapter 22 Obtaining Reports 442 CoreWatch User s Manual...
Page 456: ...Appendix B CoreWatch Menus 456 CoreWatch User s Manual...