How To |
Create A Secure Network With Allied Telesis
Managed Layer 3 Switches
Introduction
Allied Telesis switches include a range of sophisticated security features at layer 2 and layer 3.
This How To Note describes these features and includes brief examples of how to configure
them.
The implementations shown in this How To Note should be thought of as industry-standard
best practices.
Contents
Introduction .............................................................................................................................................. 1
Securing the device ................................................................................................................................. 3
Protecting the network .......................................................................................................................... 3
Managing the device securely ................................................................................................................ 9
Using Secure Shell (SSH) ................................................................................................................ 9
Using SNMPv3 ................................................................................................................................ 10
Whitelisting telnet hosts .............................................................................................................. 12
Identifying the user ................................................................................................................................ 14
IP spoofing and tracking ................................................................................................................ 14
DHCP snooping ............................................................................................................................. 15
Protecting the user ................................................................................................................................ 18
Using private VLANs ..................................................................................................................... 18
Using IPsec to make VPNs ........................................................................................................... 24
Protecting against worms ............................................................................................................. 25
C613-16103-00 REV A
www.alliedtelesis.com