13.1 AAA configuration............................................................................................................. 367
13.1.1 Local authentication configuration algorithm.......................................................... 368
13.1.2 AAA configuration algorithm via RADIUS................................................................. 371
13.1.3 AAA configuration algorithm via TACACS ............................................................... 375
13.1.4 AAA configuration algorithm via LDAP .................................................................... 378
13.1.5 Example of authentication configuration using telnet via RADIUS server ............. 382
13.2 Command privilege configuration ................................................................................... 383
13.2.1 Configuration algorithm ............................................................................................ 383
13.2.2 Example of command privilege configuration......................................................... 383
13.3 Configuration of logging and protection against network attacks................................ 383
13.3.1 Configuration algorithm ............................................................................................ 383
13.3.2 Description of attack protection mechanisms......................................................... 386
13.3.3 Configuration example of logging and protection against network attacks.......... 389
13.4 Firewall configuration....................................................................................................... 390
13.4.1 Configuration algorithm ............................................................................................ 391
13.4.2 Firewall configuration example................................................................................. 397
13.4.3 Configuration example of application filtering (DPI)............................................... 400
13.5 Access list (ACL) configuration ....................................................................................... 402
13.5.1 Configuration algorithm ............................................................................................ 403
13.5.2 Access list configuration example ........................................................................... 405
13.6 IPS/IDS configuration ....................................................................................................... 405
13.6.1 Base configuration algorithm.................................................................................... 406
13.6.2 Configuration algorithm for IPS/IDS rules autoupdate from external sources ..... 407
13.6.3 Recommended open rule update source ................................................................. 407
13.6.4 IPS/IDS configuration example with auto-update rules .......................................... 412
13.6.5 Basic user rules configuration algorithm ................................................................. 414
13.6.6 Basic user rules configuration example................................................................... 422
13.6.7 Extended user rules configuration algorithm........................................................... 424
13.6.8 Extended user rules configuration example............................................................. 425
13.7 Eltex Distribution Manager interaction configuration..................................................... 426
13.7.1 Basic configuration algorithm................................................................................... 426
13.7.2 Configuration example: ............................................................................................. 429
13.8 Content filtering service configuration ............................................................................ 432
13.8.1 Basic configuration algorithm................................................................................... 432
13.8.2 Content filtering rules configuration example ......................................................... 437
13.9 "Antispam" service configuration .................................................................................... 440
13.9.1 Basic configuration algorithm................................................................................... 440