![Enterasys X-Pedition XSR Скачать руководство пользователя страница 667](http://html1.mh-extra.com/html/enterasys/x-pedition-xsr/x-pedition-xsr_cli-reference-manual_2414758667.webp)
Firewall Feature Set Commands
XSR CLI Reference Guide 16-123
objects
such
as
ANY_EXTERNAL
and
user
‐
defined
object
names
are
case
‐
sensitive.
Refer
to
the
ip
firewall policy
command
for
applicable
policy
and
gating
rule
limits.
Syntax
ip firewall network-group
name name1 ... name10
Syntax of the “no” Form
The
no
form
of
this
command
disables
the
network
group:
no ip firewall network-group
name
Mode
Global
configuration:
XSR(config)#
Example
The
following
example
defines
network
objects
sales
and
remote
‐
access
and
adds
them
to
the
network
groups
private
‐
net
and
sales
remote
‐
access
:
XSR(config)#ip firewall network sales 192.168.100.0 ma 255.255.255.0 i
XSR(config)#ip fi network remote-access 10.1.1.0 m 255.255.255.0 i
XSR(config)#ip firewall network-group private-net sales remote-access
ip firewall policy
This
command
configures
a
firewall
policy
comprised
of
policy
objects.
Each
object/rule
is
tagged
with
a
name
which
places
the
policies
in
order
using
a
before
and
after
keyword.
This
permits
you
to
enter
policies
in
an
order
different
than
which
they
will
be
applied.
The
XSR
firewall
enforces
a
deny
all
policy
by
default.
So,
unless
there
is
a
policy
object
configured
to
allow
traffic
in
a
particular
direction,
packets
will
not
pass
through
the
firewall.
This
eliminates
the
need
to
define
catch
‐
all
reject
policies
in
each
direction.
Policies
apply
to
traffic
directed
at
the
router,
as
well.
So,
policy
objects
must
be
defined
to
allow
management
traffic
into
the
router.
Be
aware
that
the
console
port
is
always
available
for
management
purposes.
A
name
for
any
firewall
object
must
use
these
alpha
‐
numeric
characters
only
:
A
‐
Z
(upper
or
lower
case),
0
‐
9
,
-
(dash),
or
_
(underscore).
Also,
all
firewall
object
names
including
pre
‐
defined
objects
such
as
ANY_EXTERNAL
and
user
‐
defined
object
names
are
case
‐
sensitive.
name
Network
group
object
name.
Limit:
16
characters.
name1
to
name10
Name
of
the
network
or
network
‐
group
objects.
Notes:
Citing a policy’s intent in the name is useful if its function is not apparent from the definition.
Internal XSR gating rules, which order traffic filtering, are stored in a temporary file in Flash.
Because there is one gating rule for each network source/destination expansion, a potentially
enormous number of gating rules can be generated by just a single firewall policy. For example,
when a large network that has an ANY_INTERNAL group with 200 network addresses is used as
the source address, and another group of 10 network addresses is used as the destination address,
2000 gating rules are defined for the policy. Accordingly, a limit is applied to their total, depending on
the amount of installed RAM.
Содержание X-Pedition XSR
Страница 1: ...X Pedition Security Router XSR CLI Reference Guide Version 7 6 P N 9033842 07...
Страница 2: ......
Страница 10: ...viii...
Страница 14: ...xii...
Страница 134: ...Bootrom Monitor Mode Commands 3 128 Configuring the XSR Platform...
Страница 278: ...VRRP Clear and Show Commands 5 202 Configuring the Internet Protocol...
Страница 352: ...IGMP Clear and Show Commands 7 104 Configuring IP Multicast...
Страница 406: ...Multilink Show Commands 8 136 Configuring the Point to Point Protocol...
Страница 436: ...Frame Relay Clear and Show Commands 9 112 Configuring Frame Relay...
Страница 460: ...Dialer Watch Commands 10 106 Configuring the Dialer Interface...