80
6.28. Security
You can block the un-authorized client in this function.
6.26.1 IP Source Guard - Configuration
IP Source Guard function allows the user to assign 10 specific IP addresses that have
permission to manage the switch through the http and telnet services for the securing
switch management. The purpose of giving the limited IP addresses permission is to
allow only the authorized personnel/device can do the management task on the switch.
IP Security Mode:
Having set this selection item in the
Enable
mode, the
Enable
HTTP Server
,
Enable Telnet Server
checkboxes and the ten security IP column
fields will then be available. If not, those items will appear in grey.
Enable HTTP Server:
Having ticked this checkbox, the devices whose IP
addresses match any one of the ten IP addresses in the Security IP1 ~ IP10 table
will be given the permission to access this switch via HTTP service.
Enable Telnet Server:
Having ticked this checkbox, the devices whose IP
addresses match any one of the ten IP addresses in the Security IP1 ~ IP10 table
will be given the permission to access this switch via telnet service.
Enable SNMP Management:
Having ticked this checkbox, the devices whose IP
addresses match any one of the ten IP addresses in the Security IP1 ~ IP10 table
will be given the permission to access this switch via SNMP service.
Summary of Contents for 2204F Series
Page 23: ...16 LC connector to the transceiver ...
Page 31: ...24 ...
Page 37: ...30 IP Addressing interface ...
Page 40: ...33 SNMP Agent Configuration interface ...
Page 48: ...41 ...
Page 52: ...45 Port Statistics interfac ...
Page 59: ...52 6 17 2Aggregator Status You can check the setting of Port aggregation in Status ...
Page 64: ...57 RSTP Port Configuration interface ...
Page 67: ...60 field and click Delete to remove it ...
Page 75: ...68 6 24 2Switch Status You can see the status of VLAN setting in this function ...
Page 80: ...73 highest priority Click Apply to have the configuration take effect ...
Page 91: ...84 6 26 3 3 Port Status You can monitor the port Authorized state in this function ...
Page 92: ...85 6 26 4 MAC Filtering You can block the un authorized MAC by switch in this function ...
Page 93: ...86 6 26 5 Port Security You can block the un authorized MAC by oer port in this function ...
Page 102: ...95 Straight through cables schematic Cross over cables schematic ...