EasyManua.ls Logo

3Com 4510G - Page 541

3Com 4510G
1166 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
vi
Troubleshooting SSL·····························································································································11-6
SSL Handshake Failure·················································································································11-6
12 Public Key Configuration······················································································································12-1
Asymmetric Key Algorithm Overview····································································································12-1
Basic Concepts······························································································································12-1
Key Algorithm Types ·····················································································································12-1
Asymmetric Key Algorithm Applications························································································12-2
Configuring the Local Asymmetric Key Pair··························································································12-2
Creating an Asymmetric Key Pair ·································································································12-2
Displaying or Exporting the Local RSA or DSA Host Public Key··················································12-3
Destroying an Asymmetric Key Pair······························································································12-3
Configuring the Public Key of a Peer····································································································12-3
Displaying and Maintaining Public Keys ·······························································································12-4
Public Key Configuration Examples······································································································12-5
Configuring the Public Key of a Peer Manually·············································································12-5
Importing the Public Key of a Peer from a Public Key File····························································12-6
13 ACL Overview ········································································································································13-1
Introduction to ACL ·······························································································································13-1
Introduction····································································································································13-1
Application of ACLs on the Switch ································································································13-1
Introduction to IPv4 ACL·······················································································································13-2
IPv4 ACL Classification ·················································································································13-2
IPv4 ACL Naming··························································································································13-2
IPv4 ACL Match Order ··················································································································13-3
IPv4 ACL Step·······························································································································13-4
Effective Period of an IPv4 ACL····································································································13-4
IP Fragments Filtering with IPv4 ACL ···························································································13-4
Introduction to IPv6 ACL·······················································································································13-5
IPv6 ACL Classification ·················································································································13-5
IPv6 ACL Naming··························································································································13-5
IPv6 ACL Match Order ··················································································································13-5
IPv6 ACL Step·······························································································································13-6
Effective Period of an IPv6 ACL····································································································13-6
ACL Application·····································································································································13-6
14 IPv4 ACL Configuration ························································································································14-1
Creating a Time Range·························································································································14-1
Configuration Procedure················································································································14-1
Configuration Example··················································································································14-2
Configuring a Basic IPv4 ACL···············································································································14-2
Configuration Prerequisites ···········································································································14-2
Configuration Procedure················································································································14-3
Configuration Example··················································································································14-3
Configuring an Advanced IPv4 ACL ·····································································································14-4
Configuration Prerequisites ···········································································································14-4
Configuration Procedure················································································································14-4
Configuration Example··················································································································14-5
Configuring an Ethernet Frame Header ACL························································································14-6

Table of Contents

Related product manuals