Enterasys Security Router X-PeditionTM User Manual page 27

Enterasys security router user's guide
Table of Contents

Advertisement

Application Level Commands ......................................................................................................... 16-13
Application Level Gateway ............................................................................................................. 16-13
On Board URL Filtering .................................................................................................................. 16-14
Denial of Service (DoS) Attack Protection ...................................................................................... 16-15
Alarm Logging ................................................................................................................................ 16-16
Alarms ............................................................................................................................................ 16-16
Authentication................................................................................................................................. 16-17
Firewall and NAT ............................................................................................................................ 16-18
Firewall and VPN ............................................................................................................................ 16-18
ACLs and Firewall .......................................................................................................................... 16-18
Dynamic Reconfiguration ............................................................................................................... 16-18
Firewall CLI Commands ............................................................................................................................. 16-19
Firewall Limitations ..................................................................................................................................... 16-22
Pre-configuring the Firewall ........................................................................................................................ 16-23
Steps to Configure the Firewall .................................................................................................................. 16-23
Configuration Examples ............................................................................................................................. 16-24
XSR with Firewall ................................................................................................................................. 16-24
XSR with Firewall, PPPoE and DHCP ................................................................................................. 16-26
XSR with Firewall and VPN .................................................................................................................. 16-27
Firewall Configuration for VRRP .......................................................................................................... 16-33
Firewall Configuration for RADIUS Authentication and Accounting ..................................................... 16-33
Configuring Simple Security ................................................................................................................. 16-34
RPC Policy Configuration ..................................................................................................................... 16-35
Appendix A: Alarms/Events, System Limits, and Standard ASCII Table
Recommended System Limits ........................................................................................................................A-1
System Alarms and Events ............................................................................................................................A-3
Firewall and NAT Alarms and Reports .........................................................................................................A-14
Standard ASCII Character Table ..................................................................................................................A-19
Service Level Reporting MIB Tables ..............................................................................................................B-1
etsysSrvcLvlMetricTable.....................................................................................................................B-1
etsysSrvcLvlOwnerTable ....................................................................................................................B-2
etsysSrvcLvlHistoryTable ...................................................................................................................B-2
etsysSrvcLvlNetMeasureTable ...........................................................................................................B-3
etsysSrvcLvlAggrMeasureTable .........................................................................................................B-4
BGP v4 MIB Tables ........................................................................................................................................B-5
General Variables Table .....................................................................................................................B-5
BGP v4 Peer Table.............................................................................................................................B-5
BGP-4 Received Path Attribute Table ................................................................................................B-7
BGP-4 Traps.......................................................................................................................................B-8
Firewall MIB Tables ........................................................................................................................................B-9
Global Interface Operations .....................................................................................................................B-9
Monitoring Objects .................................................................................................................................B-10
Policy Rule Table Totals Counters ...................................................................................................B-10
Policy Rule True Table .....................................................................................................................B-10
Session Totals Counters ..................................................................................................................B-10
Session Totals Table ........................................................................................................................B-10
IP Session Counters.........................................................................................................................B-11
IP Session Table ..............................................................................................................................B-11
Authenticated Address Counters......................................................................................................B-11
Authenticated Addresses Table........................................................................................................B-11
xxv

Advertisement

Table of Contents
loading

This manual is also suitable for:

X-pedition xsr

Table of Contents