144 CHAPTER 7: ACL CONFIGURATION
Networking Diagram
Figure 39 QoS Configuration Example
Configuration Procedure
Define port mirroring, with monitoring port being Ethernet3/0/8.
[4500-Ethernet3/0/8]monitor-port
[4500-Ethernet3/0/1]mirroring-port both
ACL Control
Configuration
The Switch provides three modes for users to access devices remotely:
■ TELNET access
■ Security shell (SSH) access
■ Simple network management protocol (SNMP) access
The Switch provides security control features and controls the three access modes,
consequently preventing illegal users from logging into and accessing switches.
Security control can be divided into the following two levels:
■ Level 1 – User connection control. Configured access control list (ACL) filters
login users so that only legal users can be connected to the switch.
■ Level 2: User password authentication. Before logging into the switch, the
users connected to the switch must pass the password authentication.
This chapter describes how to configure level 1 security control, that is how to
configure ACLs for login users. For the level 2 security configuration, refer to
“User
Interface Configuration”.
TELNET/SSH User ACL
Configuration
Before login users perform password authentication, the ACLs configured for
TELNET or SSH users filter some malicious or illegal connection request,
consequently assuring device security.
Configuration Prerequisites
You have correctly configured to log into switches in the TELNET or SSH mode.
Server
E3/0/2
E3/0/1
E3/0/8