ExtremeWare Software 7.3.0 Command Reference Guide
761
11
Security Commands
This chapter describes:
•
Commands for creating and configuring routing access policies
•
Commands for creating and configuring IP access lists
•
Commands for creating and configuring route maps
•
Commands for managing the switch using SSH2
•
Commands related to switch user authentication through a RADIUS client
•
Commands related to switch user authentication through
•
Commands for protecting the switch from Denial of Service (DoS) attacks
•
Commands for Network Login configuration
•
Commands for Trusted MAC or OUI configuration
•
Commands for configuring secure access for all wired and wireless stations through Unified
Access™ Security
Access policies
are a generalized category of features that impact forwarding and route forwarding
decisions. Access policies are used primarily for security and quality of service (QoS) purposes.
IP access lists
(also referred to as Access Lists or ACLs) consist of IP access rules and are used to perform
packet filtering and forwarding decisions on incoming traffic. Each packet arriving on an ingress port is
compared to the access list in sequential order and is either forwarded to a specified QoS profile or
dropped. Using access lists has no impact on switch performance.
Access lists are typically applied to traffic that crosses layer 3 router boundaries, but it is possible to use
access lists within a layer 2 VLAN. Extreme products are capable of performing this function with no
additional configuration.
Routing access policies
are used to control the advertisement or recognition of routing protocols, such as
RIP, OSPF, IS-IS, or BGP. Routing access policies can be used to ‘hide’ entire networks or to trust only
specific sources for routes or ranges of routes. The capabilities of routing access policies are specific to
the type of routing protocol involved, but are sometimes more efficient and easier to implement than
access lists.
To use routing access policies, follow these steps:
1
Create an access profile.
2
Configure the access profile mode to be of type
permit
,
deny
, or
none (which allows per-entry
configuration of the permit/deny attribute).
Summary of Contents for ExtremeWare 7.3.0
Page 54: ...54 ExtremeWare Software 7 3 0 Command Reference Guide Contents...
Page 104: ...104 ExtremeWare Software 7 3 0 Command Reference Guide Commands for Accessing the Switch...
Page 378: ...378 ExtremeWare Software 7 3 0 Command Reference Guide FDB Commands...
Page 418: ...418 ExtremeWare Software 7 3 0 Command Reference Guide QoS Commands...
Page 436: ...436 ExtremeWare Software 7 3 0 Command Reference Guide NAT Commands...
Page 600: ...600 ExtremeWare Software 7 3 0 Command Reference Guide SLB Commands...
Page 968: ...968 ExtremeWare Software 7 3 0 Command Reference Guide Security Commands...
Page 1002: ...1002 ExtremeWare Software 7 3 0 Command Reference Guide EAPS Commands...
Page 1126: ...1126 ExtremeWare Software 7 3 0 Command Reference Guide ESRP Commands...
Page 1392: ...1392 ExtremeWare Software 7 3 0 Command Reference Guide IGP Commands...
Page 1478: ...1478 ExtremeWare Software 7 3 0 Command Reference Guide BGP Commands...
Page 1556: ...1556 ExtremeWare Software 7 3 0 Command Reference Guide IP Multicast Commands...
Page 1600: ...1600 ExtremeWare Software 7 3 0 Command Reference Guide IPX Commands...
Page 1616: ...1616 ExtremeWare Software 7 3 0 Command Reference Guide ARM Commands...
Page 1694: ...1694 ExtremeWare Software 7 3 0 Command Reference Guide PoS Commands...
Page 1750: ...1750 ExtremeWare Software 7 3 0 Command Reference Guide T1 E1 and T3 WAN Commands...
Page 1856: ...1856 ExtremeWare Software 7 3 0 Command Reference Guide MPLS Commands...
Page 1898: ...1898 ExtremeWare Software 7 3 0 Command Reference Guide High Density Gigabit Ethernet Commands...
Page 1938: ...1938 ExtremeWare Software 7 3 0 Command Reference Guide Power Over Ethernet Commands...
Page 1988: ...1988 ExtremeWare Software 7 3 0 Command Reference Guide H VPLS Commands...
Page 2106: ...2106 ExtremeWare Software 7 3 0 Command Reference Guide Wireless Commands...
Page 2132: ...2132 ExtremeWare Software 7 3 0 Command Reference Guide Configuration and Image Commands...
Page 2236: ...2236 ExtremeWare Software 7 3 0 Command Reference Guide Troubleshooting Commands...
Page 2254: ...2254 ExtremeWare Software 7 3 0 Command Reference Guide Index of Commands...