Access Policies; Overview Of Access Policies - Allied Telesis AT-9108 User Manual

Gigabit switches at-9108; at-8518; at-8525; at-8550
Hide thumbs Also See for AT-9108:
Table of Contents

Advertisement

Chapter 12

Access Policies

Overview of Access Policies

This chapter describes access policies, and how they are created and
implemented on the switch.
Access policies are a generalized category of features that are applied
to route forwarding decisions. Access policies are used primarily for
security purposes, and, less often, for bandwidth management.
Access policies are formed by combining an "access profile" (for
example, a list of IP routes) with an "access method" (for example,
RIP).
Access policies can be similar in effect, but different in
implementation, to other methods of restricting traffic flows
associated with using the blackhole feature of the switch software's
Policy-Based QoS.
Many of the access policy capabilities are specific to the type of
routing protocol involved. For example, instead of having the
routing protocol advertise the presence of a subnet, but not allowing
traffic to be forwarded to it, you can configure the routing protocol
to prohibit the advertisement of the subnet. Leveraging the routing
protocol in this way gives your network better security, and results in
less mis-directed traffic.
12-1

Advertisement

Table of Contents
loading

This manual is also suitable for:

At-8518At-8525At-8550

Table of Contents