12.8 MPLS traffic balancing ..................................................................................................374
12.8.1 Configuration example .............................................................................................. 375
12.9 Operation with the bridge domain within MPLS ..........................................................376
12.10 Assignment of MTU when operating with MPLS.........................................................378
12.11 Inter-AS Option A............................................................................................................384
12.11.1 L2VPN......................................................................................................................... 384
12.11.2 L3VPN......................................................................................................................... 395
12.12 Inter-AS Option B............................................................................................................409
12.12.1 L3VPN......................................................................................................................... 410
12.13 MPLS over GRE ..............................................................................................................423
12.13.1 L2VPN......................................................................................................................... 423
12.13.2 L3VPN......................................................................................................................... 430
13 Security management....................................................................................................... 439
13.1 AAA configuration..........................................................................................................439
13.1.1 Local authentication configuration algorithm.......................................................... 440
13.1.2 AAA configuration algorithm via RADIUS................................................................. 443
13.1.3 AAA configuration algorithm via TACACS ............................................................... 446
13.1.4 AAA configuration algorithm via LDAP .................................................................... 449
13.1.5 Example of authentication configuration using telnet via RADIUS server ............. 453
13.2 Command privilege configuration ................................................................................453
13.2.1 Configuration algorithm ............................................................................................ 454
13.2.2 Example of command privilege configuration......................................................... 454
13.3 Logging and network attacksprotection configuration ..............................................454
13.3.1 Configuration algorithm ............................................................................................ 454
13.3.2 Description of attack protection mechanisms......................................................... 457
13.3.3 Configuration example of logging and protection against network attacks.......... 460
13.4 Firewall configuration....................................................................................................461
13.4.1 Configuration algorithm ............................................................................................ 461
13.4.2 Firewall configuration example................................................................................. 469
13.4.3 Configuration example of application filtering (DPI)............................................... 471
13.5 Access list (ACL) configuration ....................................................................................474
13.5.1 Configuration algorithm ............................................................................................ 474
13.5.2 Access list configuration example ........................................................................... 476
13.6 IPS/IDS configuration ....................................................................................................477
13.6.1 Base configuration algorithm.................................................................................... 477
13.6.2 Configuration algorithm for IPS/IDS rules autoupdate from external sources ..... 478
13.6.3 Recommended open rule update source ................................................................. 479
13.6.4 IPS/IDS configuration example with rules autoupdate ........................................... 484