Contents12 SmartSwitch Router User Reference ManualIPX Addresses............................................................................................................... 153Configuring IPX Interfaces and Parameters.................................................................... 154Configure IPX Addresses to Ports ............................................................................. 154Configure IPX Interfaces for a VLAN ....................................................................... 154Specify IPX Encapsulation Method ........................................................................... 154Configure IPX Routing ....................................................................................................... 155Enable IPX RIP.............................................................................................................. 155Enable SAP .................................................................................................................... 155Configure Static Routes............................................................................................... 155Configure Static SAP Table Entries ........................................................................... 156Control Access to IPX Networks................................................................................ 156Create an IPX Access Control List ...................................................................... 156Create an IPX Type 20 Access Control List ....................................................... 157Create an IPX SAP Access Control List ............................................................. 157Create an IPX GNS Access Control List............................................................. 157Create an IPX RIP Access Control List............................................................... 158Monitor an IPX Network.................................................................................................... 158Configuration Examples..................................................................................................... 158Chapter 10: Security Configuration Guide .......................................... 161Security Overview............................................................................................................... 161Configuring SSR Access Security...................................................................................... 162Configure RADIUS ...................................................................................................... 162Monitor RADIUS .................................................................................................. 162Configure TACACS ..................................................................................................... 162Monitor TACACS ................................................................................................. 163Configure TACACS Plus............................................................................................. 163Monitor TACACS Plus......................................................................................... 163Configure Passwords................................................................................................... 164Layer-2 Security Filters....................................................................................................... 164Configuring Layer-2 Address Filters ........................................................................ 165Configuring Layer-2 Port-to-Address Lock Filters ................................................. 165Configuring Layer-2 Static Entry Filters................................................................... 166Configuring Layer-2 Secure Port Filters ................................................................... 166Monitor Layer-2 Security Filters ................................................................................ 167Layer-2 Filter Examples............................................................................................... 168Example 1: Address Filters .................................................................................. 168Static Entries Example................................................................................... 168Port-to-Address Lock Examples .................................................................. 169Example 2 : Secure Ports ...................................................................................... 169Layer-3 Access Control Lists (ACLs)................................................................................ 170Layer-3 & Layer-4 Traffic Filters (Access Control List) .......................................... 170Anatomy of an ACL Rule............................................................................................ 170Ordering of ACL Rules................................................................................................ 171Implicit Deny Rule ....................................................................................................... 172Applying ACLs to Interfaces...................................................................................... 173Applying ACLs to Services......................................................................................... 174ACL Logging ................................................................................................................ 174Maintaining ACLs Offline Using TFTP or RCP....................................................... 175Maintaining ACLs Using the ACL Editor ................................................................ 176