DXS-3400 Series Lite Layer 3 Stackable 10GbE Managed Switch Web UI Reference Guide
356
Click the
Apply
button to accept the changes made.
The fields that can be configured in
Protect Type Information
are described below:
Parameter
Description
Protocol Name
Select the protocol name option here.
Click the
Find
button to locate a specific entry based on the information entered.
Trusted Host
This window is used to display and configure the trusted host settings.
To view the following window, click
Security > Trusted Host
, as shown below:
Figure 9-82 Trusted Host Window
The fields that can be configured are described below:
Parameter
Description
ACL Name
Enter the access class’ name here. This name can be up to 32 characters long.
Type
Select the trusted host type here. Options to choose from are
Telnet
,
SSH
,
Ping
,
HTTP
, and
HTTPS
.
Click the
Apply
button to accept the changes made.
Click the
Delete
button to remove the specific entry.
Traffic Segmentation Settings
This window is used to display and configure the traffic segmentation settings. When the traffic segmentation
forwarding domain is specified, packets received by the port will be restricted in Layer 2 packet forwarding to
interfaces within the domain. When the forwarding domain of a port is empty, Layer 2 forwarding for packets received
by the port is not restricted.
The traffic segmentation member list can be comprised of different interface types, for example port and port-channel
in the same forwarding domain. If the interfaces specified by the command include a port-channel, all the member
ports of this port-channel will be included in the forwarding domain.
If the forwarding domain of an interface is empty, then there is no restriction on Layer 2 forwarding of packets received
by the port.
To view the following window, click
Security > Traffic Segmentation Settings
, as shown below:
Summary of Contents for DXS-3400 SERIES
Page 1: ......