42
3-1-6. Management Policy
Through the management security configuration, the manager can do the
strict setup to control the switch and limit the user to access this switch.
The following rules are offered for the manager to manage the switch:
Rule 1) : When no lists exists, then it will accept all connections.
Accept
-----------------------------------------------------------------------
Rule 2) : When only “accept lists” exist, then it will deny all connections,
excluding the connection inside of the accepting range.
Accept Deny
Accept
Deny
Accept
-----------------------------------------------------------------------
Rule 3) : When only “deny lists” exist, then it will accept all connections,
excluding the connection inside of the denying range.
Deny
Accept
Deny
Accept Deny
-----------------------------------------------------------------------
Rule 4) : When both “accept and deny” lists exist, then it will deny all
connections, excluding the connection inside of the accepting range.
Accept Deny
Deny
Deny Accept
-----------------------------------------------------------------------
Rule 5) : When both “accept and deny” lists exist, then it will deny all
connections, excluding the connection inside of the accepting range and NOT
inside of the denying range at the same time.
Accept
Deny
Deny| Acc | Deny | Acc | Deny
----------------------------------------------------------------------
Accept
Summary of Contents for LGB1002A-R2
Page 1: ...i 16 Port 1000BASE TX L2 Plus Managed Ethernet Switch...
Page 5: ...v Revision History Release Date Revision 0 91 2008 03 12 A1 0 95 2008 06 30 A2...
Page 32: ...26 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection...
Page 43: ...37 Fig 3 6...
Page 71: ...65 Fig 3 24...
Page 89: ...83 Fig 3 39 Fig 3 40 Fig 3 41...
Page 105: ...99 Fig 3 62 Set up VLAN Tag Priority Mapping Finish...
Page 113: ...107 Fig 3 69 Frame Type Fig 3 70...
Page 114: ...108 Fig 3 71 Fig 3 72 Fig 3 73 ARP...
Page 115: ...109 Fig 3 74 ARP Fig 3 75 ARP Fig 3 76 ARP Fig 3 77 ARP...
Page 116: ...110 Fig 3 78 ARP Fig 3 79 ARP Fig 3 80 ARP Fig 3 81 ARP...
Page 117: ...111 Fig 3 83 ARP Fig 3 84 ARP Fig 3 85 ARP Fig 3 86 ARP Fig 3 87 ARP...
Page 118: ...112 Fig 3 88 IPv4 Fig 3 89 IPv4 Fig 3 90 IPv4...
Page 119: ...113 Fig 3 91 IPv4 Fig 3 92 IPv4 Fig 3 93 IPv4 Fig 3 94 IPv4 Fig 3 95 IPv4...
Page 120: ...114 Fig 3 96 IPv4 Fig 3 97 IPv4 Fig 3 98 IPv4 Fig 3 99 IPv4 Fig 3 100 IPv4...
Page 121: ...115 Fig 3 101 IPv4 Fig 3 102 IPv4 Fig 3 103 IPv4...
Page 122: ...116 Fig 3 104 IPv4 Fig 3 105 IPv4 Fig 3 106 IPv4...
Page 123: ...117 Fig 3 107 IPv4 Fig 3 108 IPv4 Fig 3 109 IPv4...
Page 124: ...118 Fig 3 110 IPv4 Fig 3 111 IPv4 Fig 3 112 IPv4...
Page 125: ...119 Fig 3 113 IPv4 Fig 3 114 IPv4 Fig 3 115 IPv4...
Page 126: ...120 Fig 3 116 IPv4 Fig 3 117 IPv4 Fig 3 118 Action...
Page 127: ...121 Fig 3 119 Rate Limiter Fig 3 120 Port Copy...
Page 128: ...122 Fig 3 121 DMAC Filter Fig 3 122 VLAN ID Filter Fig 3 123 VLAN ID Filter...
Page 140: ...134 Fig 3 126 Set up Policy Rules Fig 3 127 Set up Policy Rules Fig 3 128 Set up Policy Rules...
Page 196: ...190 Fig 3 170...
Page 204: ...198 Fig 4 1 Fig 4 2 LGB1002A R2 LGB1002A R2 LGB1002A R2 LGB1002A R2...
Page 255: ...249 MAC Address Alias 1 00 02 03 04 05 06 aaa 2 00 33 03 04 05 06 ccc 3 00 44 33 44 55 44 www...
Page 258: ...252 6 Enable 6 Normal 7 Enable 7 Normal 8 Enable 8 Normal...
Page 318: ......