EasyManua.ls Logo

ELTEX ESR Series - 8 Interface management

ELTEX ESR Series
575 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ESR-Series. User manual
8
13.1 AAA configuration............................................................................................................. 367
13.1.1 Local authentication configuration algorithm.......................................................... 368
13.1.2 AAA configuration algorithm via RADIUS................................................................. 371
13.1.3 AAA configuration algorithm via TACACS ............................................................... 375
13.1.4 AAA configuration algorithm via LDAP .................................................................... 378
13.1.5 Example of authentication configuration using telnet via RADIUS server ............. 382
13.2 Command privilege configuration ................................................................................... 383
13.2.1 Configuration algorithm ............................................................................................ 383
13.2.2 Example of command privilege configuration......................................................... 383
13.3 Configuration of logging and protection against network attacks................................ 383
13.3.1 Configuration algorithm ............................................................................................ 383
13.3.2 Description of attack protection mechanisms......................................................... 386
13.3.3 Configuration example of logging and protection against network attacks.......... 389
13.4 Firewall configuration....................................................................................................... 390
13.4.1 Configuration algorithm ............................................................................................ 391
13.4.2 Firewall configuration example................................................................................. 397
13.4.3 Configuration example of application filtering (DPI)............................................... 400
13.5 Access list (ACL) configuration ....................................................................................... 402
13.5.1 Configuration algorithm ............................................................................................ 403
13.5.2 Access list configuration example ........................................................................... 405
13.6 IPS/IDS configuration ....................................................................................................... 405
13.6.1 Base configuration algorithm.................................................................................... 406
13.6.2 Configuration algorithm for IPS/IDS rules autoupdate from external sources ..... 407
13.6.3 Recommended open rule update source ................................................................. 407
13.6.4 IPS/IDS configuration example with auto-update rules .......................................... 412
13.6.5 Basic user rules configuration algorithm ................................................................. 414
13.6.6 Basic user rules configuration example................................................................... 422
13.6.7 Extended user rules configuration algorithm........................................................... 424
13.6.8 Extended user rules configuration example............................................................. 425
13.7 Eltex Distribution Manager interaction configuration..................................................... 426
13.7.1 Basic configuration algorithm................................................................................... 426
13.7.2 Configuration example: ............................................................................................. 429
13.8 Content filtering service configuration ............................................................................ 432
13.8.1 Basic configuration algorithm................................................................................... 432
13.8.2 Content filtering rules configuration example ......................................................... 437
13.9 "Antispam" service configuration .................................................................................... 440
13.9.1 Basic configuration algorithm................................................................................... 440

Table of Contents

Related product manuals