Create A Secure Network With Allied Telesis Managed Layer 3 Switches
Create A Secure Network With Allied Telesis Managed Layer 3 Switches
Create A Secure Network With Allied Telesis Managed Layer 3 Switches
Introduction
Allied Telesis switches include a range of sophisticated security features at layer 2 and layer 3.
This How To Note describes these features and includes brief examples of how to configure
them.
Contents
Introduction .............................................................................................................................................. 1
Which products and software versions does this information apply to? ................................... 2
Securing the device ................................................................................................................................. 3
Protecting the network .......................................................................................................................... 3
Protecting against packet flooding ................................................................................................ 3
Protecting against rapid MAC movement ................................................................................... 6
Controlling multicast traffic ........................................................................................................... 7
Managing the device securely ................................................................................................................ 9
Using Secure Shell (SSH) ................................................................................................................ 9
Using SSL for secure web access ................................................................................................ 10
Using SNMPv3 ................................................................................................................................ 10
Whitelisting telnet hosts .............................................................................................................. 12
Identifying the user ................................................................................................................................ 14
IP spoofing and tracking ................................................................................................................ 14
Rejecting Gratuitous ARP (GARP) ............................................................................................ 15
DHCP snooping ............................................................................................................................. 15
Using 802.1x port authentication ............................................................................................... 17
Protecting the user ................................................................................................................................ 18
Using private VLANs ..................................................................................................................... 18
Using local proxy ARP and MAC-forced forwarding ............................................................. 19
Using IPsec to make VPNs ........................................................................................................... 24
Protecting against worms ............................................................................................................. 25
For information about the AlliedWare firewall, see the Firewall chapter of your Software
Reference, and the following How To Notes:
z How To Configure Some Basic Firewall And VPN Scenarios
z How To Apply Firewall Policies And Rules
Some features are only available on some switches and/or some software versions.
Therefore, when this How To Note describes each feature, it lists the applicable switches and
versions.
There are two aspects to this. Firstly, physical security is Software Versions
vital—lock your networking equipment away. All
The default password is well-known. If you do not change it, anyone with physical or IP access
could reconfigure the switch.
Storms are a reality in any network. They can occur by accident, maliciously, or when a
network device fails. They occur naturally in a network where switches are connected more
than once to the same VLAN, so administrators must employ a method to prevent these
switch loops.
Spanning Tree Protocol based solutions are the most common method of preventing loops.
However, incorrect configuration or other network issues can cause STP to fail. For example,
if a single switch in the VLAN does not have STP enabled, the STP tree will not converge
properly. Spanning tree protocols can even fail if a broadcast storm drowns out STP
messages.
Service providers need to prevent storms from disrupting services to customers. AlliedWare
offers the following options for mitigating storms:
z limiting broadcasts and multicasts on a port (“Bandwidth limiting” on page 4)
z detecting a storm and disabling that port or VLAN (“Using QoS policy-based storm
protection” on page 5)
Bandwidth limiting
ARP packets are the most frequent trigger for broadcast Products
storms. One ARP packet is flooded around and around a All switches listed on page 2
network, crowding out all other traffic.
Software Versions
You can use a simple Quality of Service (QoS) configuration All
to match ARP packets and make sure that when a broadcast
storm occurs, the effect is minimised.
ISP switch
ISP switch
secure-switch-bandwidth.eps
Example The following configuration limits ARP packets to 100kbps on port 48.
create classifier=1 protocol=0806 ethformat=ethii-untagged
create qos policy=1
create qos trafficclass=1 maxbandwidth=100
create qos flowgroup=1
add qos policy=1 trafficclass=1
add qos trafficclass=1 flowgroup=1
add qos flowgroup=1 classifier=1
set qos port=48 policy=1
The procedure above applies storm protection to classified traffic, and uses a classifier to
select all broadcast traffic. This is the most common approach. If you want to, you can instead
classify to select important non-broadcast traffic and apply storm protection to unmatched
traffic. Unimportant or unwanted unicast and multicast traffic then counts towards the storm
calculations.
To apply storm protection to unclassified traffic, configure storm protection on the default
traffic class in the QoS policy settings. Use the parameters dtcstormwindow,
dtcstormrate, dtcstormaction, and dtcstormtimeout.
Example The following example applies storm protection to classified broadcast traffic on port 1. If
there is a storm, it takes the link down for 60 seconds.
set switch enhancedmode=qoscounters
Reboot after turning on enhanced mode.
create classifier=1 macdaddr=ff-ff-ff-ff-ff-ff
create qos trafficclass=1 stormstatus=enable stormwindow=100
stormrate=100 stormaction=linkdown stormtimeout=60
You can view matching traffic at the port level with the command:
show qos port=1 count trafficclass
Rapid MAC movement protection is on by default. The default action is to disable learning for
1 second. This gives the CPU of the switch some idle time, which may let a fast STP-type
protocol converge. You can change the amount of idle time to suit your network, or select a
different action.
2. Set the sensitivity in detecting rapid MAC movement, by using the following command to
tell the switch how many times a MAC address can move ports in one second:
set switch thrashlimit=5..255
Configuration Rapid MAC movement protection also works with trunk groups. If one switch in a trunk fails,
on trunk the switches probably cannot negotiate STP or any other trunks that they belong to. This
groups immediately causes a broadcast storm. Rapid MAC movement protection on the other
switch in the trunk group detects such a storm because flooding of the same packet occurs
on all trunk ports connected to the failed switch.
For a static trunk, to make use of rapid MAC movement protection, create the trunk and
specify the optional thrashaction and thrashtimeout parameters:
create switch trunk=<name> port=<ports>
thrashaction={learndisable|linkdown|none|portdisable|
vlandisable} thrashtimeout={none|1..86400}
For a dynamic trunk using LACP, enable LACP, add ports, and set the optional thrashaction
and thrashtimeout parameters:
enable lacp
add lacp port=<ports>
set lacp thrashaction={learndisable|linkdown|none|portdisable|
vlandisable} thrashtimeout={none|1..86400}
When multicasting, it is essential to avoid filling the network with unnecessary multicast data
and to make sure that the clients who join a group are entitled to receive it. It is also
important to minimise delays in joining a group and to efficiently handle those who leave a
group.
The following sections outline some of the IGMP controls that are particularly relevant for
security. For detailed information on how to control IGMP in the network, see How To
Configure IGMP for Multicasting on Routers and Managed Layer 3 Switches. This How To Note is
available from www.alliedtelesis.com/resources/literature/howto.aspx.
IGMP snooping
IGMP snooping is enabled by default on Allied Telesis Products
managed layer 3 switches. IGMP snooping monitors the All switches listed on page 2
streams and clients involved in each multicast group,
independent from IP itself. A snooping switch ensures that Software Versions
only ports that are interested in a group are sent it. This All
basic level of management works in tandem with the
subnetwork's IGMP querier and makes sure that the querier
gets notified of any client who wants to join the group.
IGMP filtering
IGMP filtering lets you dictate exactly which multicast Products
groups a specific port can receive, by creating a filter list and All switches listed on page 2
applying it to the port. Different ports may have different that support 2.7.5 or later
filter lists applied to them.
Software Versions
If desired, you can select the type of message to filter. By 2.7.5 or later
default, filters apply to IGMP reports. You can create extra
entries to also filter queries (type=query) and leave
messages (type=leave).
Note: The order of entries in a filter is important. When IGMP tries to match a message
to a filter, it performs a linear search of the filter to find a matching entry. It tries
each entry in turn, and stops processing the filter after the first match it finds.
4. Create an entry to block all groups (action=exclude). Give this entry a higher entry
number than entries for the included groups.
5. Apply the filter to the port.
Example To stop the user attached to port 1 from joining any group except 224.12.13.14:
create igmp filter=1
add igmp filter=1 entry=1 group=224.12.13.14 action=include
add igmp filter=1 entry=2 group=224.0.0.0-239.255.255.255
action=exclude
set switch port=1 igmpfilter=1
IGMP throttling
Throttling limits the number of multicast groups that an Products
individual port can join. All switches listed on page 2
that support 2.7.5 or later
Example To limit port 2 to a total of 6 groups:
set switch port=2 igmpmaxgroup=6 Software Versions
igmpaction=replace 2.7.5 or later
Because you cannot guarantee traffic privacy, you cannot be certain that management
sessions are private. Therefore, you should always use encrypted sessions when remotely
administering network equipment, even in networks that you know well. The simplest way to
achieve this is with Secure Shell (SSH).
Then the section ends by describing how to limit telnet access if you need to use telnet
instead of one of the recommended secure options (“Whitelisting telnet hosts” on page 12).
When you are using a secure management scheme, we recommend that you block all telnet
access to the switch, by disabling the telnet server:
disable telnet server
Configuration 1. Add a security officer to your switch’s list of users. Software Versions
2. Create encryption keys for SSH to use. All
Example To configure SSH access for the security officer called “secoff”:
add user=secoff password=securepass privilege=security telnet=yes
login=yes
create enco key=0 type=rsa length=1024 description="Host Key"
form=ssh
create enco key=1 type=rsa length=768 description="Server Key"
form=ssh
enable ssh server serverkey=1 hostkey=0 expirytime=1
logintimeout=60
add ssh user=secoff password=sameordifferentpassword
enable system security
Once you have configured SSL, HTTPS connections to the device are available only on
port 443.
Example To allow the security officer called “secoff” to browse securely to the GUI, using a self-signed
certificate:
add user=secoff password=secoff privilege=securityofficer
login=yes
create enco key=0 type=rsa length=1024
set system distinguishedname="cn=switch1,o=my_company,c=us"
create pki certificate=cer_name keypair=0 serialnumber=12345
subject="cn=172.30.1.105,o=my_company,c=us"
add pki certificate=cer_name location=cer_name.cer trust=yes
set http server security=on sslkey=0 port=443
enable system security
Using SNMPv3
Products
Traditionally, SNMP has been a popular but insecure way to
monitor networks. All switches listed on page 2
Software Versions
Allied Telesis devices are SNMPv3 compliant. By using
SNMPv3, you can authenticate SNMP users and restrict 2.6.4 and later
their network access to parts of the network. SNMPv3 is
very flexible, as the examples in this section show.
Examples To allow the user “steve” full read, write and notify SNMP access to the switch:
enable snmp
add snmp view=full oid=1.3.6.1 type=include
add snmp group=super-users securitylevel=authPriv readview=full
writeview=full notifyview=full
add snmp user=steve group=super-users authprotocol=md5
authpassword=cottonsox privprotocol=des privpassword=woollytop
To also give the user “jane” read and notify access to everything on the switch, add the
following commands:
add snmp group=users securitylevel=authNoPriv readview=full
notifyview=full
add snmp user=jane group=users authprotocol=md5
authpassword=redjeans
To also give the user “paul” unauthenticated read access to everything on the switch except
BGP, add the following commands:
add snmp view=restricted oid=1.3.6.1 type=include
# exclude bgp by specifying either mib=bgp or oid=1.3.6.1.2.1.15:
add snmp view=restricted mib=bgp type=exclude
add snmp group=restricted-users securitylevel=noAuthNoPriv
readview=restricted
add snmp user=paul group=restricted-users
To also send traps securely to the PC with IP address 192.168.11.23 for user “steve” to see,
add the following commands:
add snmp targetparams=netmonpc securitylevel=authPriv user=steve
add snmp targetaddress=nms ip=192.168.11.23 udp=162
params=netmonpc
For more information about the above examples, see How To Configure SNMPv3 On Allied
Telesis Routers and Managed Layer 3 Switches, available from www.alliedtelesis.com/resources/
literature/howto.aspx. This How To Note also explains SNMPv3 concepts in detail, including
users, groups and views.
The first filter blocks (action=deny) any incoming telnet packets with the switch’s
destination IP address. The second filter reverses the first filter by undoing the previous
denial of IP access to the switch—but only for the permitted source IP addresses.
Example To permit only the host with IP address 172.30.1.144 to telnet to the switch 172.28.40.70:
add switch l3filter match=dipaddress,protocol,tcpdport dclass=32
add switch l3f=1 entry protocol=tcp dipaddress=172.28.40.70
tcpdport=23 action=deny
add switch l3filter match=dipaddress,sipaddress sclass=32
dclass=32
add switch l3filter=2 entry sipaddress=172.30.1.144
dipaddress=172.28.40.70 action=nodrop
3. Create a flow group and add the classifiers for permitted Software Versions
traffic to it. 2.7.3 and later
4. Create a second flow group with a higher ID number and
add the classifier that matches all telnet traffic to it.
5. Create the rest of the QoS framework—traffic class and policy.
6. Apply the policy to all ports to stop telnet from all directions.
Example To permit only the host with IP address 172.30.1.144 to telnet to the switch 172.28.40.70:
create classifier=1 ipsa=172.30.1.144/32 ipda=172.28.40.70/32
tcpd=23
create classifier=2 ipda=172.28.40.70/32 tcpd=23
create qos flowgroup=1 action=forward
create qos flowgroup=2 action=discard
create qos trafficclass=1
create qos policy=1
add qos flowgroup=1 classifier=1
add qos flowgroup=2 classifier=2
add qos trafficclass=1 flowgroup=1
add qos trafficclass=1 flowgroup=2
add qos policy=1 trafficclass=1
set qos port=all policy=1
Changing IP address for malicious reasons is most commonly called IP spoofing, and is also
known as ARP spoofing, ARP poisoning, and ARP poison routing (APR). The net result is the
same for all of these: the victim ends up with false information in its ARP table.
A phoney announcement may be made in a number of ways for a number of reasons. The
following table briefly explains these factors.
The techniques for protecting the network are the same for all these phoney
announcements: reject gratuitous ARPs, and control access to ports with DHCP snooping
and ARP security. The following sections describe these solutions in detail.
You can configure Allied Telesis switches and routers to ignore GARP packets. Ignoring
GARPs does not completely prevent IP spoofing, but it does shut down one easy avenue for
an attacker.
Note: We do not recommend disabling GARP reception if a server with teamed network
cards is attached to the switch. In a teamed-NIC redundancy set-up, another card
takes over if a card fails. In many implementations, the NIC that takes over sends a
GARP to inform the switch of the port and MAC address change.
DHCP snooping
Products
The AlliedWare DHCP snooping feature is a series of layer 2
techniques. It works with information from a DHCP server AT-8600 Series
to: AT-8700XL Series
z track the physical location of hosts Rapier i Series
Rapier Series
z ensure that hosts only use the IP addresses assigned to
them AT-8800 Series
AT-8948
z ensure that only authorised DHCP servers are accessible.
x900-48 Series
In short, DHCP snooping ensures IP integrity on an L2- AT-9900 Series
switched domain.
Software Versions
With DHCP snooping, only a whitelist of IP addresses may 2.7.6 and later
access the network. You configure this whitelist at the switch
port level, and the DHCP server manages the access control. Only specific IP addresses with
specific MAC addresses on specific ports may access the IP network.
DHCP snooping also stops attackers from adding their own DHCP servers to the network.
An attacker could set up a server to wreak havoc in the network or even control it.
For more information about setting up DHCP snooping, see How To Use DHCP Snooping,
Option 82 and Filtering on Rapier, AT-8800 and AT-8600 Series Switches or How To Use DHCP
Snooping, Option 82 and Filtering on x900 Series Switches. These How To Notes are available
from www.alliedtelesis.com/resources/literature/howto.aspx.
Example To limit each port on a 24-port switch to 1 lease, when the DHCP server is on port 24:
enable dhcpsnooping
set dhcpsnooping port=24 trusted=yes
set dhcpsnooping port=1-23 maxlease=1
On AT-8948, x900-48 and AT-9900 switches, also add the following commands:
create classifier=50 macsaddr=dhcpsnooping prot=ip
ipsaddr=dhcpsnooping
create classifier=51 protocol=ip
create qos policy=1
create qos trafficclass=1
create qos flow=50 action=forward
create qos flow=51 action=discard
add qos policy=1 trafficclass=1
set qos port=1-23 policy=1
add qos trafficclass=1 flow=50
add qos trafficclass=1 flow=51
add qos flow=50 classifier=50
add qos flow=51 classifier=51
Example To specify that the host with MAC address 00-00-00-00-00-12 can legitimately use the IP
address 172.16.0.12 on port 12, use the following command in addition to the configuration
given in “Setting up DHCP snooping”, above.
add dhcpsnooping binding=00-00-00-00-00-12 ip=172.16.0.12
interface=vlan1 port=12
Example To pass option 82 information to the server, including the information that port 1 is room
101, use the following commands in addition to the configuration given in “Setting up DHCP
snooping” on page 16.
enable dhcpsnooping option82
set dhcpsnooping port=1 subscriberid="Room 101"
ARP security stops clients that are directly attached to the switch from using IP spoofing or
ARP poisoning. It also protects directly-attached clients from IP spoofing and ARP poisoning.
Example To turn on ARP security, use the following command in addition to the configuration given in
“Setting up DHCP snooping”, above.
enable dhcpsnooping arpsecurity
A network controller, such as a RADIUS server, controls the authentication. The Allied
Telesis switch facilitates the host to server communication and takes note of success or
failure. Essentially, the host is completely denied access to the Ethernet until the switch sees
the host successfully authenticate with the server. After that, the switch allows packets to
and from the host to pass through the 802.1x controlled port.
Examples For examples of 802.1x authentication, see the following How To Notes:
z How to Configure A Secure School Network Based On 802.1x
z How To Use 802.1x VLAN Assignment
z How To Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to
Make a Secure Network
z How To Use 802.1x Security with AT-WA7400 APs, AT-8624PoE Switches, and Linux’s
freeRADIUS and Xsupplicant
Most of the above Notes describe how to configure the authentication server and the host,
as well as the switch.
Note that ports are only isolated from ports on the same physical switch, not
from ports on other switches reached through an uplink port.
Example To create a private VLAN with ports 2-6 in it, with an uplink trunk group of ports 24 and 25:
create vlan=example vid=2 private
add vlan=2 port=24-25 frame=tagged uplink
add vlan=2 port=2-6
You can use these features, for example, to allow customers to use VoIP to telephone each
other while blocking any video, data, or management traffic between customers.
MAC-forced forwarding (page 23) requires more configuration than local proxy ARP
(page 20) but is more powerful. MAC-forced forwarding:
z ensures that all ARP replies are generated by the directly-connected switch (not the access
router). This removes the ARP process from the access router, minimises the distance
ARPs travel through the network, and protects against ARP Denial of Service attacks.
z dynamically determines the appropriate access router for a host by snooping DHCP
packets.
z bypassing the access router for traffic between application servers and their clients.
With software versions 291-05 and later, you can use MAC-forced forwarding without
configuring private VLANs. However, we recommend you use it with private VLANs for
maximum security.
The following figure shows a network that can use either local proxy ARP or MAC-forced
forwarding—the examples in both the following sections refer to this network.
Internet
Management
PC
24
Access 5
Router 20
1 2
SIP and Multicast
server
LACP
Residential
1 2
Gateway 1
Edge
15
Switch 1
49
50
Client 1
50
Edge
Switch 3
49 Residential
Gateway 2
49
50
Edge 14 Client 2
Switch 2 15 Residential
Gateway 3
Client 3
macff.eps
If local proxy ARP is configured on the access router, then the access router responds to
ARP requests with its own MAC address, instead of the destination device’s MAC address.
This combination of private VLANs and local proxy ARP forces the clients to send all their
traffic to the access router. When the access router sees traffic from a client, it checks a list
of filters to determine whether to forward the traffic or drop it.
On each client residential gateway, you need to enable tagged VLANs on the connection to
the edge switch for the VLANs that the client should be able to access.
Configuration 1. Create the VLANs, specifying that they are private. Make a different VLAN for each type
of edge of traffic that you want to control differently.
switches
2. Add the uplink and private ports to the VLANs as tagged ports.
3. Configure any other requirements, such as a management IP address.
Example To allow VoIP (voice) but no other traffic between clients in the above network, use the
following configuration for edge switch 1 (an AT-8648 switch in this example):
ena stp=default
set stp=default mode=rapid
Use the following configuration for edge switches 2 and 3 (AT-8648 switches in this
example):
ena stp=default
set stp=default mode=rapid
Use the following configuration for the access router (a Rapier 24i switch in this example):
delete lacp port=3-24
enable lacp
enable ip
add ip int=vlan101 ip=192.168.1.254 proxy=local
add ip int=vlan102 ip=192.168.2.254 proxy=local
add ip int=vlan103 ip=192.168.3.254 proxy=local
add ip int=vlan104 ip=192.168.4.254 proxy=local
For more information about how MACFF works, see How To Use MAC-Forced Forwarding with
DHCP Snooping to Create Enhanced Private VLANs. This How To Note is available from
www.alliedtelesis.com/resources/literature/howto.aspx.
Configuration 1. Create a VLAN for each type of service (for example, voice, video, and data). With
of edge software versions 291-04 and earlier, the VLANs must be private VLANs. With software
switches versions 291-05 and later, you can use non-private VLANs. However, we recommend you
use private VLANs for maximum security.
2. Add the uplink and private ports to the VLANs as tagged ports.
3. Enable DHCP snooping and ARP security. ARP security ensures that ARP packets received
on untrusted (client) ports are only forwarded if they originate from an IP in the DHCP
snooping database of current valid entries.
4. Specify the trusted ports. Private VLAN uplink ports need to be trusted ports, so that they
can forward DHCP packets.
5. Configure other aspects of DHCP snooping, such as static IP address bindings and the
maximum number of leases for ports.
6. On AT-8948, AT-9900, and x900-48 Series switches, create classifiers for DHCP snooping.
7. Enable MAC-forced forwarding.
8. Configure any other requirements, such as a management IP address, STP and LACP.
Example How To Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs
includes the full configuration for the network on page 19, including the three client
residential gateways, the three edge switches, and the access router. For your convenience,
we have reproduced the configuration scripts for the edge switches and the access router in
“Appendix: Configuration scripts for MAC-forced forwarding example” on page 27.
Examples For examples of the many ways to configure IPsec, see the following How To Notes:
z How To Configure VPNs In A Corporate Network, With Optional Prioritisation Of VoIP
z How To Configure Microsoft® Windows 2000 Virtual Private Network (VPN) client
interoperability without NAT-T support
z How To Configure Microsoft® Windows 2000 Virtual Private Network (VPN) client
interoperability with NAT-T support
z How To Configure Microsoft® Windows XP Virtual Private Network (VPN) client interoperability
without NAT-T support
z How To Configure Microsoft® Windows XP Virtual Private Network (VPN) client interoperability
with NAT-T support
z How To Configure IPsec VPN Between Microsoft ISA Server 2004 and an Allied Telesyn Router
Client
z How To Create a VPN between an Allied Telesis and a SonicWALL router, with NAT-T
z How To Create a VPN between an Allied Telesis and a NetScreen router
z How To Troubleshoot A Virtual Private Network (VPN)
Worms and viruses generally exploit flaws in PC operating systems. There are no known
worms that affect AlliedWare. In fact, you can configure Allied Telesis switches to protect
your network PCs and servers from both internal and external attack from worms.
In an Allied Telesis switched network (where no hubs exist), the switches can forward or
drop every packet on the basis of specific criteria. You can employ this packet inspection at
no cost to network performance. Therefore, you can configure an Allied Telesis switch to
check for packets that appear to exploit a TCP or UDP port that a known worm attacks.
Example To block the W32.Slammer worm on port 1, which does not have an SQL client or server
attached to it:
create classifier=1 udpdport=1434 protocol=ip iport=1
add switch hwfilter classifier=1 action=discard
On these switches, AlliedWare classifiers offer a large range of matchable fields, including
destination port, source port, IPX, interface, TOS, DSCP value, and MAC source or
destination addresses. Once the classifier has selected a matched packet, what happens to it
can vary from discarding or forwarding it, to marking the DSCP value, and many other
alternatives.
Example To block the W32.Slammer worm on port 1, which does not have an SQL client or server
attached to it:
create class=1 udpd=1434
create qos flow=1 action=discard
create qos trafficclass=1
create qos policy=1
add qos flow=1 class=1
add qos trafficclass=1 flow=1
set qos port=1 policy=1
Edge switch 1
Edge switch 1 is directly connected to the access router.
enable dhcpsnooping
enable dhcpsnooping arpsecurity
enable dhcpsnooping option82
set dhcpsnooping port=1 trusted=yes
set dhcpsnooping port=2 trusted=yes
set dhcpsnooping port=49 trusted=yes
set dhcpsnooping port=50 trusted=yes
set dhcpsnooping port=15 maxleases=4
enable ip
add ip int=vlan500 ip=172.16.5.101 mask=255.255.255.0
delete lacp port=3-50
enable lacp
Edge switch 2
Edge switch 2 is connected to port 50 of edge switch 1. The configuration is similar to edge
switch 1—differences are in bold:
# System configuration
set system name="Edge Switch 2"
# IP configuration
enable ip
add ip int=vlan500 ip=172.16.5.102 mask=255.255.255.0
# MACFF configuration
enable macff int=vlan100
enable macff int=vlan200
enable macff int=vlan300
enable macff int=vlan400
enable macff int=vlan500
Edge switch 3
Edge switch 3 is connected to port 49 of edge switch 1. The configuration is similar to edge
switch 1—differences are in bold:
# System configuration
set system name="Edge Switch 3"
# IP configuration
enable ip
add ip int=vlan500 ip=172.16.5.103 mask=255.255.255.0
# MACFF configuration
enable macff int=vlan100
enable macff int=vlan200
enable macff int=vlan300
enable macff int=vlan400
enable macff int=vlan500
Access Router
set system name="Access Router"
# Create a VLAN for accessing the Internet, SIP server and multicast groups
create vlan=CoreNetwork vid=28
enable stp=default
set stp=default mode=rapid
set stp=default port=3-23 edgeport=yes
enable ip
add ip int=vlan28 ip=172.28.40.60
add ip int=vlan100 ip=172.16.1.254 mask=255.255.255.0
add ip int=vlan200 ip=172.16.2.254 mask=255.255.255.0
add ip int=vlan300 ip=172.16.3.254 mask=255.255.255.0
add ip int=vlan400 ip=172.16.4.254 mask=255.255.255.0
add ip int=vlan500 ip=172.16.5.254 mask=255.255.255.0
add ip rou=0.0.0.0 mask=0.0.0.0 int=vlan28 next=172.28.0.1
disable ip icmp=redirect
# Create a filter to drop all traffic within and between VLANs 100-500
add switch hwfilter classifier=10 action=discard
# Create filters to allow the exceptions (voice traffic)
add switch hwfilter classifier=100 action=nodrop
add switch hwfilter classifier=401 action=nodrop
add switch hwfilter classifier=402 action=nodrop
add switch hwfilter classifier=501 action=nodrop
add switch hwfilter classifier=502 action=nodrop
USA Headquarters | 19800 North Creek Parkway | Suite 200 | Bothell | WA 98011 | USA | T: +1 800 424 4284 | F: +1 425 481 3895
European Headquarters | Via Motta 24 | 6830 Chiasso | Switzerland | T: +41 91 69769.00 | F: +41 91 69769.11
Asia-Pacific Headquarters | 11 Tai Seng Link | Singapore | 534182 | T: +65 6383 3832 | F: +65 6383 3830
www.alliedtelesis.com
© 2007 Allied Telesis, Inc. All rights reserved. Information in this document is subject to change without notice. Allied Telesis is a trademark or registered trademark of Allied Telesis, Inc. in the United States and other countries.
All company names, logos, and product designs that are trademarks or registered trademarks are the property of their respective owners.
C613-16103-00 REV A