74
C
HAPTER
10: M
AKING
Y
OUR
N
ETWORK
S
ECURE
A maximum of 32 access lists can be applied under the current operating
system. Access list rules can be applied and traffic is forwarded at wire
speed using layer 3 destination IP addresses and network ports.
How Access Control
List Rules Work
When a packet is received on a port, it is compared against the ACL
bound to that port. If the destination address of the packet lies within the
address range of one of the ACL’s rules then that rule is applied. By
default, if no access list has been defined for a network port, all IP traffic
will be permitted. Denial is based on a pre-defined rule.
For example:
Packet destination IP address: 10.101.67.45
Rule destination address: 10.101.67.0
Rule destination mask: 255.255.255.0
Rule action: deny
As a result of the above rule, the packet matches the parameters of the
rule and will be blocked.
Port Security
The Switch 3226 and Switch 3250 support the following port security
modes, which you can set for an individual port or a range of ports:
■
No Security
Port security is disabled and all network traffic is forwarded through
the port without any restrictions.
■
Static
Access will be restricted to MAC addresses that have already
connected to the port. To add a new device, change the security
setting for the port to
No Security
, connect the device and change the
setting back to
Static
.
■
Network Login
When the user has been successfully authorized, all network traffic is
forwarded through the port without any restrictions. For further
information see
“What is Network Login?”
on
page 75
.
■
Network Login (Secure)
When the user has been successfully authorized, only network traffic
that is received from the authorized client device is forwarded through
Summary of Contents for 3CR17501-91 - SuperStack 3 Switch 3250
Page 8: ......
Page 20: ...20 CHAPTER 1 SWITCH FEATURES OVERVIEW ...
Page 43: ...How STP Works 43 Figure 9 STP configurations ...
Page 54: ...54 CHAPTER 6 USING TRAFFIC MANAGEMENT ...
Page 66: ...66 CHAPTER 8 SETTING UP VIRTUAL LANS ...
Page 70: ...70 CHAPTER 9 USING AUTOMATIC IP CONFIGURATION ...
Page 98: ...98 CHAPTER 11 IP ROUTING ...
Page 102: ...102 APPENDIX A CONFIGURATION RULES ...
Page 106: ...106 APPENDIX B NETWORK CONFIGURATION EXAMPLES ...
Page 132: ...132 INDEX ...