Instruction/ maintenance manual of the product Layer 3 Switches Allied Telesis
Go to page of 31
C613-16103-00 REV A www .alliedtelesis.com How T o | Intr oduction Allied T elesis switches include a range of sophisti cated security features at la y er 2 and la yer 3. This How T o Note des cribes these featur es and includes brief examples of ho w to configure them.
Which pr oducts and software v ersions does this information apply to? Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 2 Appendix: Configuration scripts for MA C-for ced forwarding example ... ................................ 27 Edge switch 1 .
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 3 Securing the de vice Securing the de vice The first step towar ds making a secur e network is to secur e the netw orking equipment itself. There ar e two aspects to this. Firstly , ph ysical security is vital—lock your netw orking equ ipment a wa y .
Pr otecting the network Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 4 Ser vice pro viders need to pre vent storms fr om disrupting ser vices to customers.
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 5 Pr otecting the network Using QoS policy-based storm pr otection P olicy-based storm protection lets y ou specify one of a range of actions for the s witch to take when it detects a br oadcast storm.
Pr otecting the network Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 6 Example The following example applie s storm protection to classified br oadcast traffic on por t 1 . If there is a storm, it tak es the link down f or 60 seconds.
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 7 Pr otecting the network 2. Set the sensitivity in detecting rapid MA C mo vement, by using the f ollowing command to tell the switch how many times a MA C addr ess can move ports in one second: set switch thrashlimit=5.
Pr otecting the network Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 8 IGMP filtering IGMP filtering lets you dictate exac tly which multicast gr oups a spec ific port can receiv e , by cr eating a fil ter list and applying it to the port.
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 9 Managing the de vice securel y Mana ging the de vice securel y In Ethernet and br oadc ast netw orks the pri vacy of traffic is not g uaranteed. Hubs and networks outside the administrator's contr ol ma y leak sensitive data to unwanted r ecipients.
Managing the de vice securel y Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 10 Using SSL for secur e w eb access If you pr efer to configur e the switch using the conv enient we b-based GUI, then this is un encr ypted by default.
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 11 Managing the de vice securel y Examples T o allow the user “ste ve” full r ead, write and notify SNMP access to the switch: enable snmp add snmp view=full oid=1.
Managing the de vice securel y Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 12 Whitelisting telnet hosts For an y remote management of a netw ork de vice, Allied T elesis recommends y ou use SSH, Secure HTTP ( SSL), or SNMPv3.
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 13 Managing the de vice securel y Building a whitelist thr ough QoS On A T -8948, A T -9900, A T -990 0s, and x900 Series switches, use classifiers to build a whitelist and QoS to apply it.
Identifying the user Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 14 Identifying the user This section describes methods for authorising and tracking users and pre venting them fr om changing their identi ty on the netw ork.
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 15 Identifying the user Rejecting Gratuitous ARP (GARP) Hosts can use GARP to anno unce th eir presence on a subnet. It is a helpfu l mechanism, par ticularly when ther e is a chance of duplicate addresses.
Identifying the user Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 16 For mor e information about setting up DHCP snooping, see How T o Use DHCP Snooping, Option 82 and Filtering on Rapier , A T -8800 and A T -8600 Ser ies Switc hes or How T o Use DHCP Snooping, Option 82 and Filtering on x900 Ser ies Switches .
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 17 Identifying the user Using DHCP snooping to track clients If yo u r D H C P s e r ve r s u p po r ts i t , yo u c an u s e “option 82” to record mor e information about DHCP clients.
Pro tecting the user Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 18 Pr otecting the user This section describes the following methods of pr otecting users fr om other users on the network: z “Using private VLANs” on page 18 .
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 19 Pro tecting the user Example T o create a private VLAN with por ts 2-6 in it, with an uplink trunk group of por ts 24 and 2 .
Pro tecting the user Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 20 The following figur e shows a network that can use either local pr oxy ARP or MA C-for ced forwar ding—the examples in both the fo llowing sections r efer to this netw ork.
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 21 Pro tecting the user Configuration of edge swi tc hes 1. Create the VLANs, specifying that the y are pr ivate. Mak e a different VLAN for each type of traffic that y o u want to contr ol differentl y .
Pro tecting the user Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 22 Use the following configuration f or edge s witches 2 and 3 (A T -8648 s witches in this example): ena .
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 23 Pro tecting the user # Create a classifier to match all traffic in VLANs 101-104 create class=10 ipsa=192.168.0.0/16 ipda=192.168.0.0/16 # Create a classifier to match voice traffic create class=100 ipsa=192.
Pro tecting the user Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 24 Configuration of edge swi tc hes 1. Create a VLAN f or each type of ser vice (for example , voice, video, and data). With so ftw are vers io ns 2 91 -04 and ea rli er , th e V LAN s mu st b e pr iv ate VLA Ns .
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 25 Pro tecting the user z Ho w T o Configure Micr osoft® Windows XP Vir tual Private Network (V PN) c lient inter operability .
Pro tecting the user Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 26 T o block the W32.Slammer worm on port 1 , which does not ha ve an SQL client or s er ver attached to i.
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 27 Appendix: Configuration scripts for MA C-forced f orwarding example Appendix: Configuration scripts for MA C-for ced forwar .
Appendix: Configuration scripts for MA C-forced f orwarding example Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 28 Edge s witch 2 Edge switch 2 is connected to port 50 of edge switch 1 .
Create A Secure Netw ork With Allied T elesis Managed La yer 3 Sw itches 29 Appendix: Configuration scripts for MA C-forced f orwarding example Edge s witch 3 Edge switch 3 is connected to port 49 of edge switch 1 .
Appendix: Configuration scripts for MA C-forced f orwarding example Creat e A Secure Netw ork With Allied T elesis Managed La yer 3 Switches 30 Access Router set system name="Access Ro uter".
USA Headq u ar ters | 19800 Nor th Cr eek Parkwa y | S u ite 200 | Bothell | WA 98011 | USA | T: +1 800 424 4284 | F: +1 425 481 3895 E u r opea n Headq u ar ters | Via Motta 24 | 6830 Chiasso | Switzerla n d | T: +41 91 69769.
An important point after buying a device Allied Telesis Layer 3 Switches (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Allied Telesis Layer 3 Switches yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Allied Telesis Layer 3 Switches - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Allied Telesis Layer 3 Switches you will learn all the available features of the product, as well as information on its operation. The information that you get Allied Telesis Layer 3 Switches will certainly help you make a decision on the purchase.
If you already are a holder of Allied Telesis Layer 3 Switches, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Allied Telesis Layer 3 Switches.
However, one of the most important roles played by the user manual is to help in solving problems with Allied Telesis Layer 3 Switches. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Allied Telesis Layer 3 Switches along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center