Blade ICE G8000 manual Using ACL Filters, MAC Extended ACLs

Page 95

RackSwitch G8000 Application Guide

Using ACL Filters

Access Control Lists are filters that allow you to classify data packets according to a particular content in the packet header, such as the source address, destination address, source port num- ber, destination port number, and others. Packet classifiers identify flows for more processing. Each filter defines the conditions that must match for inclusion in the filter, and also the actions that are performed when a match is made.

ACLs are used to control whether packets are forwarded or blocked at the switch ports. ACLs can provide basic security for access to the network. For example, you can use an ACL to per- mit one host to access a part of the network, and deny another host access to the same area.

Each ACL contains rules that define the matching criteria for data packets. The ACL checks each packet against its rules, to determine if there is a match. If the packet matches the ACL’s rules, the ACL performs its configured action: either permit or deny the packet.

The G8000 supports the following ACL types:

„MAC Extended ACLs

„IP Standard ACLs

„IP Extended ACLs

MAC Extended ACLs

The switch supports up to 127 MAC extended ACLs, numbered from 1-65535. Use MAC Extended ACLs to filter traffic using the following criteria:

„Source/destination MAC address

„VLAN

„Ethernet protocol

„User priority criteria

To create a MAC Extended ACL:

RS G8000 (config)# access-list mac extended 1

RS G8000 (config-ext-macl)#

To delete a MAC Extended ACL:

RS G8000 (config)# no access-list mac extended 1

RS G8000 (config)#

BMD00041, November 2008

Chapter 6: Quality of Service „ 95

Image 95
Contents Application Guide RackSwitch G8000 Application Guide Contents Ports and Trunking Quality of Service Appendix a Troubleshooting Figures RackSwitch G8000 Application Guide Tables RackSwitch G8000 Application Guide Who Should Use This Guide PrefaceWhat You’ll Find in This Guide Typographic Conventions Typographic ConventionsHow to Get Help Accessing the Switch Configure the default gateway. Enable the gateway Configuring an IP InterfaceLog on to the switch Enter IP interface mode Using Telnet Configuring BBI access via Https Using the Browser-Based InterfaceConfiguring BBI access via Http RS G8000 config# access https import-certificate Snmp Using SnmpDefault configuration Snmp v1Privacy-password User configuration22 „ Accessing the Switch SNMPv1 trap host Configuring Snmp Trap HostsSNMPv2 trap host configuration Configure an entry in the notify tableSNMPv3 trap host configuration Securing Access to the Switch How Radius authentication works Radius Authentication and AuthorizationConfigure the Radius secret and enable the feature Configuring RadiusRadius authentication features in Blade OS Radius Attributes for G8000 user privileges Switch User AccountsHow TACACS+ authentication works TACACS+ AuthenticationAuthorization TACACS+ authentication features in Blade OSAccounting Command authorization and loggingConfigure the TACACS+ secret and second secret Configuring TACACS+ AuthenticationSSH encryption of management messages Configuring SSH features on the switchSecure Shell SSH Integration with RADIUS/TACACS+ Authentication Generating RSA Host and Server Keys for SSH accessUser Access Control End User Access ControlConsiderations for configuring End User Accounts Logging into an End User account Listing current UsersRackSwitch G8000 Application Guide 38 „ Accessing the Switch Port-based Network Access Control Extensible Authentication Protocol over LAN Port Unauthorized 802.1X authentication processEAPoL message exchange „ Force Unauthorized 802.1X port states„ Unauthorized „ AuthorizedSupport for Radius Attributes Supported Radius attributesConfiguration guidelines BMD00041, November VLANs Overview Viewing VLANs VLANs and Port Vlan ID NumbersVlan numbers Pvid numbers Viewing and Configuring PVIDsVlan Tagging 1Default Vlan settings 2Port-based Vlan assignment 4802.1Q tag assignment Vlan Topologies and Design Considerations Vlan configuration rulesComponent Description Multiple VLANs with Tagging AdaptersVlan Configure the VLANs and their member ports Vlan configuration exampleEnable tagging on uplink ports that support multiple VLANs Private Vlan ports Private VLANsSelect a Vlan and define the Private Vlan type as primary Configuration exampleVerify the configuration Configure a secondary Vlan and map it to the primary VlanRackSwitch G8000 Application Guide 62 „ VLANs Ports and Trunking Statistical load distribution Built-In fault toleranceStatic trunk group configuration rules Before you configure static trunks66 „ Ports and Trunking Follow these steps on the G8000 Port Trunking ExampleExamine the trunking information on each switch Repeat the process on the other switch„ Source IP SIP + Destination IP DIP Configurable Trunk Hash AlgorithmLink Aggregation Control Protocol Admin keyRS G8000 # show lacp information Set the Lacp mode Lacp configuration guidelinesConfiguring Lacp Spanning Tree 1Ports, Trunk Groups, and VLANs Determining the Path for Forwarding BPDUs Bridge Protocol Data Units BPDUsChanging the Spanning Tree mode Spanning Tree Group configuration guidelinesAssigning a Vlan to a Spanning Tree Group Adding and removing ports from STGs Creating a VlanRules for Vlan Tagged ports RackSwitch G8000 Application Guide Port state changes Rapid Spanning Tree ProtocolLink Type Rstp configuration guidelinesPort Type and Link Type Edge PortConfigure Rapid Spanning Tree Rstp configuration examplePer Vlan Rapid Spanning Tree Default Spanning Tree configuration1Two VLANs on one Spanning Tree Group Why do we need multiple Spanning Trees?Set the Spanning-tree mode to PVRST+ Pvrst configuration guidelinesConfiguring Pvrst Common Internal Spanning Tree Multiple Spanning Tree ProtocolMstp Region Mstp configuration guidelines Passing Vlan Blocking Vlan Configure Multiple Spanning Tree Protocol Configuring Multiple Spanning Tree Groups90 „ Spanning Tree Fast Uplink Convergence Configuring Fast Uplink ConvergenceRackSwitch G8000 Application Guide 92 „ Spanning Tree Quality of Service COS MAC Extended ACLs Using ACL FiltersIP Extended ACLs IP Standard ACLs1Well-known protocol types Assigning ACLs to a port Understanding ACL priorityViewing ACL statistics Use the following command to view ACL statisticsAssign the ACL to port ACL configuration examplesConfigure an Access Control List Example100.10.1.0 Add the ACL to a port Add the ACL to portConfigure a MAC ACL to deny all other traffic Configure IP ACLs to deny all other trafficAssign the ACLs to a port Broadcast storms Using Storm Control FiltersConfiguring storm control Differentiated Services Concepts Using Dscp Values to Provide QoSRackSwitch G8000 Application Guide Drop Class Precedence Per Hop BehaviorQoS Levels Default QoS Service LevelsDSCP-to-802.1p mapping Use the following command to perform DSCP-to-802.1p mapping3Layer 2 802.1q/802.1p Vlan tagged packet Using 802.1p Priority to Provide QoSQueuing and Scheduling 802.1p configuration exampleConfigure a port’s default 802.1p priority value to Overview Remote MonitoringRmon group 1-Statistics Configuring Rmon statisticsEnable Rmon on a port Configure the Rmon statistics on a portHistory MIB Object ID Rmon group 2-HistoryView Rmon History for the port Rmon group 3-AlarmsConfiguring Rmon History Configure the Rmon History parameters for a portConfiguring Rmon Alarms Alarm MIB objectsRmon group 9-Events Configure Rmon eventsConfigure the Rmon Alarm parameters to track Icmp messages Configure the Rmon event parametersBasic IP Routing IP Routing Benefits 1The Router Legacy Network Routing Between IP Subnets122 „ Basic IP Routing Example of Subnet Routing 2Switch-Based Routing Topology1Subnet Routing Example IP Address Assignments Using VLANs to segregate Broadcast Domains3Subnet Routing Example Optional Vlan Ports Add the switch ports to their respective VLANsAssign a Vlan to each IP interface Configure the default gateway to the routers’ addressesEnable IP routing Dynamic Host Configuration Protocol RackSwitch G8000 Application Guide 128 „ Basic IP Routing Igmp Igmp Snooping IGMPv3 Snooping FastLeaveAdd VLANs to Igmp Snooping Igmp Snooping configuration exampleConfigure Igmp Snooping Enable IGMPv3 Snooping optionalRS G8000# show ip igmp groups View dynamic Igmp informationStatic Multicast Router Configure a Static Multicast RouterHigh Availability 1Uplink Failure Detection example Uplink Failure DetectionFailure Detection Pair Spanning Tree Protocol with UFD Configuration guidelinesTurn on Uplink Failure Detection UFD Configuring UFDMonitoring UFD Troubleshooting Figure A-1Monitoring Ports Monitoring PortsPort Mirroring behavior Configuring Port MirroringEnable port mirroring View the current configurationBMD00041, November Numerics IndexIgmp TACACS+
Related manuals
Manual 28 pages 31.53 Kb