Management Access Security
ExtremeWare XOS 10.1 Concepts Guide
129
Using Policies
After the policy file has been transferred on the switch, it can be checked to see if it is syntactically
correct. Use the following command to check the policy syntax:
check policy <policy-name>
To apply a policy, use the command appropriate to the client. Some examples include:
configure bgp import-policy [<policy-name> | none]
configure bgp neighbor [<remoteaddr> | all] {address-family [ipv4-unicast |
ipv4-multicast]} route-policy [in | out] [none | <policy>]
configure bgp peer-group <peer-group-name> route-policy [in | out] [none | <policy>]
configure ospf area <area-identifier> external-filter [<policy-map> |none]
configure ospf area <area-identifier> interarea-filter [<policy-map> | none]
configure rip import-policy [<policy-name> | none]
configure rip vlan [<vlan-name> | all] route policy [in | out] [<policy-name> | none]
configure rip [vlan <vlan-name> | all] trusted-gateway [<policy-name> | none]
To remove a policy, use the
none
option.
Refreshing Policies
When a policy file is changed (adding, deleting an entry, adding/deleting/modifying a statement etc.),
the new file can be downloaded to the switch and the user must refresh the policy so that the latest
copy of policy will be used.
When the policy is refreshed, the policy file is read, processed, and stored in the server database. Any
clients that use the policy will also be updated. Use the following command to refresh the policy:
refresh policy <policy-name>
Saving Policies
A policy file in the server database can be saved back to a text file. You can save the policy to the
original file name, or save it to a different file name. Use the following command to save the policy:
save policy <policy-name> {<newName>}
Management Access Security
Management access security features control access to the management functions available on the
switch. These features help insure that any configuration changes to the switch can only be done by
authorized users. In this category are the following features:
•
Authenticating Users Using RADIUS or
Authenticating Users Using RADIUS or
ExtremeWare XOS provides two methods to authenticate users who login to the switch:
•
RADIUS
•
Содержание ExtremeWare XOS 10.1
Страница 12: ...12 ExtremeWare XOS 10 1 Concepts Guide Contents...
Страница 15: ...Part 1 Using ExtremeWare XOS...
Страница 16: ......
Страница 20: ...20 ExtremeWare XOS 10 1 Concepts Guide ExtremeWare XOS Overview...
Страница 32: ...32 ExtremeWare XOS 10 1 Concepts Guide Accessing the Switch...
Страница 74: ...74 ExtremeWare XOS 10 1 Concepts Guide Virtual LANs VLANs...
Страница 80: ...80 ExtremeWare XOS 10 1 Concepts Guide Forwarding Database FDB...
Страница 112: ...112 ExtremeWare XOS 10 1 Concepts Guide Status Monitoring and Statistics...
Страница 133: ...Part 2 Using Switching and Routing Protocols...
Страница 134: ......
Страница 174: ...174 ExtremeWare XOS 10 1 Concepts Guide Virtual Router Redundancy Protocol...
Страница 184: ...184 ExtremeWare XOS 10 1 Concepts Guide IP Unicast Routing...
Страница 202: ...202 ExtremeWare XOS 10 1 Concepts Guide Interior Gateway Protocols...
Страница 216: ...216 ExtremeWare XOS 10 1 Concepts Guide Exterior Gateway Routing Protocols...
Страница 224: ...224 ExtremeWare XOS 10 1 Concepts Guide IP Multicast Routing...
Страница 225: ...Part 3 Appendixes...
Страница 226: ......
Страница 234: ...234 ExtremeWare XOS 10 1 Concepts Guide Software Upgrade and Boot Options...
Страница 242: ...242 ExtremeWare XOS 10 1 Concepts Guide Troubleshooting...
Страница 256: ...4 ExtremeWare XOS 10 1 Concepts Guide Index of Commands...