Contents
xx OmniSwitch AOS Release 7 Network Configuration Guide June 2013
Creating Policy Actions .......................................................................................25-46
Creating Policy Rules ...........................................................................................25-47
Creating Policy Lists ............................................................................................25-50
Verifying Policy Configuration ............................................................................25-52
Using Condition Groups in Policies ............................................................................25-53
Sample Group Configuration ...............................................................................25-53
Creating Network Groups ....................................................................................25-54
Creating Services ..................................................................................................25-55
Creating Service Groups ......................................................................................25-56
Creating MAC Groups .........................................................................................25-57
Creating Port Groups ............................................................................................25-58
Verifying Condition Group Configuration ...........................................................25-59
Using Map Groups ......................................................................................................25-60
Sample Map Group Configuration .......................................................................25-60
How Map Groups Work .......................................................................................25-61
Creating Map Groups ...........................................................................................25-61
Verifying Map Group Configuration ...................................................................25-62
Using Access Control Lists .........................................................................................25-63
Layer 2 ACLs .......................................................................................................25-63
Layer 3 ACLs .......................................................................................................25-65
IPv6 ACLs ............................................................................................................25-66
Multicast Filtering ACLs .....................................................................................25-66
Using ACL Security Features ..............................................................................25-67
Applying the Configuration ........................................................................................25-71
Interaction With LDAP Policies ..........................................................................25-72
Verifying the Applied Policy Configuration ........................................................25-73
Policy Applications .....................................................................................................25-74
Basic QoS Policies ...............................................................................................25-74
Redirection Policies ..............................................................................................25-76
Policy Based Mirroring ........................................................................................25-77
ICMP Policy Example ..........................................................................................25-77
802.1p and ToS/DSCP Marking and Mapping ....................................................25-78
Policy Based Routing ...........................................................................................25-79
Chapter 26 Managing Policy Servers .......................................................................................26-1
In This Chapter ..............................................................................................................26-1
Policy Server Specifications .........................................................................................26-2
Policy Server Defaults ...................................................................................................26-2
Policy Server Overview ................................................................................................26-3
Installing the LDAP Policy Server ................................................................................26-3
Modifying Policy Servers .............................................................................................26-4
Modifying LDAP Policy Server Parameters ..........................................................26-4
Disabling the Policy Server From Downloading Policies ......................................26-4
Modifying the Port Number ...................................................................................26-5
Modifying the Policy Server Username and Password ..........................................26-5
Modifying the Searchbase ......................................................................................26-5