–
235
–
Security Measures
You can configure this switch to authenticate users logging into the system for
management access using local or remote authentication methods. Port-based
authentication using IEEE 802.1X can also be configured to control either
management access to the uplink ports or client access to the data ports. This
switch provides secure network management access using the following options:
◆
Use local or remote authentication to configure access rights, specify
authentication servers, configure remote authentication and accounting.
◆
Manually configure access rights on the switch for specified
users.
◆
Allows stations to authenticate and access the network
in situations where 802.1X or Network Access authentication methods are
infeasible or impractical.
◆
- Configure MAC authentication, intrusion response, dynamic
VLAN assignment, and dynamic QoS assignment.
◆
Provide a secure web connection.
◆
Provide a secure shell (for secure Telnet access).
◆
Access Control Lists provide packet filtering for IP frames (based on
address, protocol, Layer 4 protocol port number or TCP control code).
◆
Filters management access to the web, SNMP or Telnet interface.
◆
Configure secure addresses for individual ports.
◆
Use IEEE 802.1X port authentication to control access to
specific ports.
◆
Protects against Denial-of-Service attacks.
◆
Filter IP traffic on insecure ports for which the source address
cannot be identified via DHCP snooping.
◆
Filters IPv4 traffic on insecure ports for which the source
address cannot be identified via DHCPv4 snooping nor static source bindings.
◆
Security feature that validates the MAC Address bindings for
Address Resolution Protocol packets. Provides protection against ARP traffic
Summary of Contents for GEL-5261
Page 14: ...14 Contents Glossary 551 Index 559...
Page 26: ...26 Figures...
Page 30: ...30 Section I Getting Started...
Page 42: ...42 Section II Web Configuration IP Services on page 527...
Page 45: ...Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface 45 Figure 1 Dashboard...
Page 62: ...62 Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface...
Page 180: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 180...
Page 208: ...Chapter 8 Congestion Control Storm Control 208 Figure 121 Configuring Storm Control...
Page 228: ...228 Chapter 10 Quality of Service Attaching a Policy Map to a Port...
Page 332: ...Chapter 12 Security Measures ARP Inspection 332 Figure 207 Displaying the ARP Inspection Log...
Page 436: ...Chapter 13 Basic Administration Protocols LBD Configuration 436...
Page 488: ...488 Chapter 14 Multicast Filtering Filtering MLD Query Packets on an Interface...
Page 498: ...Chapter 15 IP Tools Address Resolution Protocol 498...
Page 517: ...517 Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 interface...
Page 542: ...540 Section III Appendices...
Page 560: ...Glossary 558...
Page 570: ...568 Index E062017 ST R01...