– 755 –
30
G
ENERAL
S
ECURITY
M
EASURES
This switch supports many methods of segregating traffic for clients
attached to each of the data ports, and for ensuring that only authorized
clients gain access to the network. Port-based authentication using IEEE
802.1X is commonly used for these purposes. In addition to these method,
several other options of providing client security are described in this
chapter. These include port-based authentication, which can be configured
to allow network client access by specifying a fixed set of MAC addresses.
The addresses assigned to DHCP clients can also be carefully controlled
with IP Source Guard and DHCP Snooping commands.
Table 71: General Security Commands
Command Group
Function
Port Security
*
Configures secure addresses for a port
802.1X Port
Authentication
*
Configures host authentication on specific ports using 802.1X
Network Access
*
Configures MAC authentication and dynamic VLAN assignment
Web Authentication
*
Configures Web authentication
Access Control Lists
*
Provides filtering for IP frames (based on address, protocol,
TCP/UDP port number or TCP control code) or non-IP frames
(based on MAC address or Ethernet type)
DHCP Snooping
*
Filters untrusted DHCP messages on unsecure ports by building
and maintaining a DHCP snooping binding table
IP Source Guard
*
Filters IP traffic on insecure ports for which the source address
cannot be identified via DHCP snooping nor static source
bindings
ARP Inspection
Validates the MAC-to-IP address bindings in ARP packets
* The priority of execution for these filtering commands is Port Security, Port
Authentication, Network Access, Web Authentication, Access Control Lists, DHCP
Snooping, and then IP Source Guard.
Summary of Contents for LGB6026A
Page 6: ...ABOUT THIS GUIDE 4...
Page 40: ...38 CONTENTS...
Page 60: ...58 SECTION I Getting Started...
Page 86: ...84 SECTION II Web Configuration Unicast Routing on page 517 Multicast Routing on page 575...
Page 162: ...160 CHAPTER 5 Interface Configuration VLAN Trunking...
Page 196: ...194 CHAPTER 6 VLAN Configuration Configuring MAC based VLANs...
Page 204: ...CHAPTER 7 Address Table Settings Clearing the Dynamic Address Table 202...
Page 238: ...CHAPTER 11 Class of Service Layer 2 Queue Settings 236...
Page 254: ...252 CHAPTER 12 Quality of Service Attaching a Policy Map to a Port...
Page 448: ...446 CHAPTER 16 Multicast Filtering Multicast VLAN Registration...
Page 470: ...468 CHAPTER 17 IP Configuration Setting the Switch s IP Address IP Version 6...
Page 576: ...574 CHAPTER 21 Unicast Routing Configuring the Open Shortest Path First Protocol Version 2...
Page 606: ...604 CHAPTER 22 Multicast Routing Configuring PIMv6 for IPv6...
Page 620: ...618 CHAPTER 23 Using the Command Line Interface CLI Command Groups...
Page 672: ...670 CHAPTER 25 System Management Commands Time Range...
Page 692: ...690 CHAPTER 26 SNMP Commands...
Page 700: ...698 CHAPTER 27 Remote Monitoring Commands...
Page 854: ...CHAPTER 34 Port Mirroring Commands Local Port Mirroring Commands 852...
Page 862: ...860 CHAPTER 36 Address Table Commands...
Page 958: ...956 CHAPTER 40 Quality of Service Commands...
Page 1034: ...1032 CHAPTER 42 LLDP Commands...
Page 1044: ...1042 CHAPTER 43 Domain Name Service Commands...
Page 1062: ...1060 CHAPTER 44 DHCP Commands DHCP Server...
Page 1206: ...CHAPTER 47 IP Routing Commands Open Shortest Path First OSPFv3 1204...
Page 1250: ...1248 SECTION IV Appendices...
Page 1256: ...1254 APPENDIX A Software Specifications Management Information Bases...
Page 1278: ...1276 COMMAND LIST...