HP 3350 - Cisco NAC Appliance Spezifikationen Seite 279

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 681
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 278
8-3
Cisco NAC Appliance - Clean Access Manager Configuration Guide
OL-28003-01
Chapter 8 User Management: Traffic Control, Bandwidth, Schedule
Overview
Example 3:
1. Allow TCP *.* 10.10.10.1/255.255.255.255
2. Block TCP *.* 10.10.10.0/255.255.255.0
Result: Allow TCP access to 10.10.10.1 while blocking TCP access to everything else in the subnet
(10.10.10.*).
Example 4 (Layer 2 Ethernet - Virtual Gateway mode only):
1. Allow SNA IBM Systems Network Architecture
2. Block ALL All Traffic
Result: Allow only IBM Systems Network Architecture (SNA) Layer 2 traffic and deny all other Layer 2
traffic.
Global vs. Local Scope
This chapter describes global traffic control policies configured under User Management > User Roles
> Traffic Control. For details on local traffic control policies configured under Device Management >
CCA Servers > Manage [CAS_IP] > Filter > Roles, see the Cisco NAC Appliance - Clean Access
Server Configuration Guide, Release 4.9(x).
Note A local traffic control policy in a specific CAS takes precedence over a global policy if the local policy
has a higher priority.
Traffic policies you add using the global forms under User Management > User Roles > Traffic
Control apply to all Clean Access Servers in the CAM’s domain and appear with white background in
the global pages.
Global traffic policies are displayed for a local CAS under Device Management > CCA Servers >
Manage [CAS_IP] > Filter > Roles and appear with yellow background in the local list.
To delete a traffic control policy, use the global or local form you used to create it.
Pre-configured default host-based policies apply globally to all Clean Access Servers and appear with
yellow background in both global and local host-based policy lists. These default policies can be enabled
or disabled, but cannot be deleted. See Enable Default Allowed Hosts, page 8-9 for details.
View Global Traffic Control Policies
Click the IP subtab link to configure IP-based traffic policies under User Management > User Roles >
Traffic Control > IP (Figure 8-2).
Click the Host subtab link to configure Host-based traffic policies under User Management > User
Roles > Traffic Control > Host. (Figure 8-7).
Click the Ethernet subtab link to configure Layer 2 Ethernet traffic control policies under User
Management > User Roles > Traffic Control > Ethernet. (Figure 8-9)
By default, IP-based traffic policies for roles are shown with the untrusted network as the source and the
trusted network as the destination of the traffic. To configure policies for traffic traveling in the opposite
direction, choose Trusted->Untrusted from the source-to-destination direction field and click Select.
You can view IP, Host-based, or Layer 2 Ethernet traffic policies for “All Roles” or a specific role by
choosing from the role dropdown menu and clicking the Select button (Figure 8-1).
Seitenansicht 278
1 2 ... 274 275 276 277 278 279 280 281 282 283 284 ... 680 681

Kommentare zu diesen Handbüchern

Keine Kommentare