– 223 –
12
Security Measures
You can configure this switch to authenticate users logging into the system for
management access using local or remote authentication methods. Port-based
authentication using IEEE 802.1X can also be configured to control either
management access to the uplink ports or client access to the data ports. This
switch provides secure network management access using the following options:
◆
– Use local or remote authentication to configure access rights, specify
authentication servers, configure remote authentication and accounting.
◆
– Manually configure access rights on the switch for specified
users.
◆
- Configure MAC authentication, intrusion response, dynamic
VLAN assignment, and dynamic QoS assignment.
◆
– Provide a secure web connection.
◆
– Provide a secure shell (for secure Telnet access).
◆
– Access Control Lists provide packet filtering for IP frames (based on
address, protocol, Layer 4 protocol port number or TCP control code).
◆
– Security feature that validates the MAC Address bindings for
Address Resolution Protocol packets. Provides protection against ARP traffic
with invalid MAC to IP Address bindings, which forms the basis for certain
“man-in-the-middle” attacks.
◆
– Filters management access to the web, SNMP or Telnet interface.
◆
– Configure secure addresses for individual ports.
◆
– Use IEEE 802.1X port authentication to control access to
specific ports.
◆
– Filter IP traffic on insecure ports for which the source address
cannot be identified via DHCP snooping.
◆
– Protects against Denial-of-Service attacks.
◆
– Filters IPv4 traffic on insecure ports for which the source
address cannot be identified via DHCPv4 snooping nor static source bindings.
Summary of Contents for GEL-1061
Page 14: ...Contents 14...
Page 28: ...Section I Getting Started 28...
Page 38: ...Chapter 1 Introduction System Defaults 38...
Page 40: ...Section II Web Configuration 40...
Page 60: ...Chapter 2 Using the Web Interface Navigating the Web Browser Interface 60...
Page 164: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 164...
Page 192: ...Chapter 8 Congestion Control Storm Control 192...
Page 204: ...Chapter 9 Class of Service Layer 3 4 Priority Settings 204...
Page 216: ...Chapter 10 Quality of Service Attaching a Policy Map to a Port 216...
Page 430: ...Chapter 14 Multicast Filtering MLD Snooping Snooping and Query for IPv4 430...
Page 436: ...Chapter 15 IP Tools Address Resolution Protocol 436...
Page 474: ...Section III Appendices 474...
Page 492: ...Glossary 492...
Page 500: ...E052016 ST R02 150200001416A...