Enterasys atx Betriebsanweisung

Seite von 242
5-20
Filters
 • Using a firewall filter to prevent problems and enhance 
performance.
For each application example, the situation is described first, and 
the objective to be accomplished is explained. Then, how the 
objective would be accomplished using the ATX is explained in 
general terms. In these examples, single letters are used to 
represent MAC-layer addresses. Real MAC addresses consist of a 
string of numbers, (22:14:15:4:5:6).
Note:
The way that you configure filters will depend on the NMS you use. 
Instructions for using LCM to set up your filters are described in 
this chapter; refer to your NMS documentation if that is the tool 
you are using to set up your filter.
5.10.1  Filtering for Security Purposes
Example 1 — Blocking access to a network segment
The objective in this example is to restrict access for security 
reasons. Workstations on one network segment (subnet) are to be 
restricted entirely from access to devices on an adjoining subnet.
In this example there are three subnets connected by a centrally 
located ATX (Figure 5-1). The subnets are referred to as the 
Engineering, Accounting and FDDI backbones.