Security Commands - Extreme Networks ExtremeWare XOS Command Reference Manual

Version 11.0
Hide thumbs Also See for ExtremeWare XOS:
Table of Contents

Advertisement

10

Security Commands

This chapter describes commands for:
• Creating and configuring policies
• Creating and configuring IP access lists
• Creating and configuring routing access policies
• Managing the switch using SSH2
• Configuring switch user authentication through a RADIUS client
• Configuring switch user authentication through TACACS+
Policies are a generalized category of features that impact forwarding and route forwarding decisions.
Access policies are used primarily for security and quality of service (QoS) purposes.
IP access lists (also referred to as Access Lists or ACLs) consist of IP access rules and are used to perform
packet filtering and forwarding decisions on incoming traffic. Each packet arriving on an ingress port is
compared to the access list in sequential order and is either forwarded to a specified QoS profile or
dropped. Using access lists has no impact on switch performance.
Access lists are typically applied to traffic that crosses layer 3 router boundaries, but it is possible to use
access lists within a layer 2 VLAN. Extreme products are capable of performing this function with no
additional configuration.
Routing access policies are used to control the advertisement or recognition of routing protocols, such as
RIP, OSPF, or BGP. Routing access policies can be used to 'hide' entire networks or to trust only specific
sources for routes or ranges of routes. The capabilities of routing access policies are specific to the type
of routing protocol involved, but are sometimes more efficient and easier to implement than access lists.
SSH
Secure Shell 2 (SSH2) is a feature of ExtremeWare that allows you to encrypt session data between a
network administrator using SSH2 client software and the switch, or to send encrypted data from the
switch to an SSH2 client on a remote system. Image and configuration files may also be transferred to
the switch using the Secure Copy Program 2 (SCP2)
ExtremeWare XOS 11.0 Command Reference Guide
409

Advertisement

Table of Contents
loading

This manual is also suitable for:

Extremeware xos 11.0

Table of Contents