xiii
RADIUS-Assigned (Dynamic) Port ACL Applications . . . . . . . . 10-17
Multiple ACLs on an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-19
Features Common to All ACL Applications . . . . . . . . . . . . . . . . . . . . 10-22
General Steps for Planning and Configuring ACLs . . . . . . . . . . . . . . 10-23
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-25
The Packet-filtering Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-26
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-29
IPv4 Traffic Management and Improved Network Performance . . 10-29
Guidelines for Planning the Structure of a Static ACL . . . . . . . . . . . 10-31
IPv4 ACL Configuration and Operating Rules . . . . . . . . . . . . . . . . . . 10-32
How an ACE Uses a Mask To Screen Packets for Matches . . . . . . . 10-35
Configuring and Assigning an IPv4 ACL
. . . . . . . . . . . . . . . . . . . . . . 10-40
General Steps for Implementing ACLs . . . . . . . . . . . . . . . . . . . . 10-40
Options for Permit/Deny Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-41
ACL Configuration Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-41
Standard ACL Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-42
Extended ACL Configuration Structure . . . . . . . . . . . . . . . . . . . 10-43
ACL Configuration Factors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-45
The Sequence of Entries in an ACL Is Significant . . . . . . . . . . . 10-45
Allowing for the Implied Deny Function . . . . . . . . . . . . . . . . . . . 10-47
Using the CLI To Create an ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-48
General ACE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-48
Using CIDR Notation To Enter the IPv4 ACL Mask . . . . . . . . . 10-49
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......