Inhaltsverzeichnis
6.6.1.1
Übersicht ......................................................................................................................... 363
6.6.1.2
Konfiguration................................................................................................................... 367
6.6.2
NAT ................................................................................................................................. 369
6.6.2.1
NAT ................................................................................................................................. 369
6.6.2.2
Statisch............................................................................................................................ 371
6.6.2.3
Pool................................................................................................................................. 372
6.6.2.4
NAPT ............................................................................................................................... 374
6.6.3
Statische Routen .............................................................................................................. 376
6.6.4
DHCP Relay Agent ............................................................................................................ 377
6.6.4.1
Allgemein ........................................................................................................................ 377
6.6.4.2
Option ............................................................................................................................. 379
6.7
6.7.1
Benutzerverwaltung ........................................................................................................ 382
6.7.2
Benutzer.......................................................................................................................... 385
6.7.2.1
Lokale Benutzer ............................................................................................................... 385
6.7.2.2
Rollen .............................................................................................................................. 388
6.7.2.3
Gruppen .......................................................................................................................... 390
6.7.3
Passwörter....................................................................................................................... 392
6.7.3.1
Passwörter....................................................................................................................... 392
6.7.3.2
Optionen ......................................................................................................................... 394
6.7.4
AAA ................................................................................................................................. 395
6.7.4.1
Allgemein ........................................................................................................................ 395
6.7.4.2
RADIUS-Client .................................................................................................................. 396
6.7.4.3
802.1X Authenticator ...................................................................................................... 400
6.7.5
MAC ACL.......................................................................................................................... 407
6.7.5.1
Regelkonfiguration........................................................................................................... 407
6.7.5.2
Ingress-Regeln ................................................................................................................. 410
6.7.5.3
Egress-Regeln .................................................................................................................. 412
6.7.6
IP ACL .............................................................................................................................. 413
6.7.6.1
Regelkonfiguration........................................................................................................... 413
6.7.6.2
Protokollkonfiguration...................................................................................................... 415
6.7.6.3
Ingress-Regeln ................................................................................................................. 417
6.7.6.4
Egress-Regeln .................................................................................................................. 419
6.7.7
Management ACL ............................................................................................................ 422
6.7.8
Brute Force Prevention ..................................................................................................... 425
7
Troubleshooting/FAQ ......................................................................................................................... 429
7.1
7.2
7.3
A
Index .................................................................................................................................................. 451
8
SCALANCE Layer 2 Switches Web Based Management (WBM) V1.0
Projektierungshandbuch, 12/2022, C79000-G8900-C661-01