vi
Troubleshooting SSL·····························································································································11-6
SSL Handshake Failure·················································································································11-6
12 Public Key Configuration······················································································································12-1
Asymmetric Key Algorithm Overview····································································································12-1
Basic Concepts······························································································································12-1
Key Algorithm Types ·····················································································································12-1
Asymmetric Key Algorithm Applications························································································12-2
Configuring the Local Asymmetric Key Pair··························································································12-2
Creating an Asymmetric Key Pair ·································································································12-2
Displaying or Exporting the Local RSA or DSA Host Public Key··················································12-3
Destroying an Asymmetric Key Pair······························································································12-3
Configuring the Public Key of a Peer····································································································12-3
Displaying and Maintaining Public Keys ·······························································································12-4
Public Key Configuration Examples······································································································12-5
Configuring the Public Key of a Peer Manually·············································································12-5
Importing the Public Key of a Peer from a Public Key File····························································12-6
13 ACL Overview ········································································································································13-1
Introduction to ACL ·······························································································································13-1
Introduction····································································································································13-1
Application of ACLs on the Switch ································································································13-1
Introduction to IPv4 ACL·······················································································································13-2
IPv4 ACL Classification ·················································································································13-2
IPv4 ACL Naming··························································································································13-2
IPv4 ACL Match Order ··················································································································13-3
IPv4 ACL Step·······························································································································13-4
Effective Period of an IPv4 ACL····································································································13-4
IP Fragments Filtering with IPv4 ACL ···························································································13-4
Introduction to IPv6 ACL·······················································································································13-5
IPv6 ACL Classification ·················································································································13-5
IPv6 ACL Naming··························································································································13-5
IPv6 ACL Match Order ··················································································································13-5
IPv6 ACL Step·······························································································································13-6
Effective Period of an IPv6 ACL····································································································13-6
ACL Application·····································································································································13-6
14 IPv4 ACL Configuration ························································································································14-1
Creating a Time Range·························································································································14-1
Configuration Procedure················································································································14-1
Configuration Example··················································································································14-2
Configuring a Basic IPv4 ACL···············································································································14-2
Configuration Prerequisites ···········································································································14-2
Configuration Procedure················································································································14-3
Configuration Example··················································································································14-3
Configuring an Advanced IPv4 ACL ·····································································································14-4
Configuration Prerequisites ···········································································································14-4
Configuration Procedure················································································································14-4
Configuration Example··················································································································14-5
Configuring an Ethernet Frame Header ACL························································································14-6