Manage Device Security
277
Insight Managed 28-Port Gigabit Ethernet Smart Cloud Switch with 2 SFP 1G & 2 SFP+ 10G Fiber Ports
The Access Rule Configuration page displays.
6.
From the
Rule Type
menu, select
Permit
or
Deny
to permit or deny access when the
selected rules are matched.
A Permit rule allows access by traffic that matches the rule criteria. A Deny rule blocks
traffic that matches the rule criteria.
7.
From the
Service Type
menu, select the access method to which the rule is applied.
The policy is restricted by the selected access method. The possible access methods are
TFTP, HTTP, and Secure HTTP (SSL).
8.
In the
Source IP Address
field, enter the source IP address of the client originating the
management traffic.
9.
In the
Mask
field, specify the subnet mask of the client that originates the management
traffic.
10.
In the
Priority
field, assign a priority to the rule.
The rules are validated against the incoming management request in ascending order of
their priorities. If a rule matches, the action is performed and subsequent rules are
ignored. For example, if a source IP 10.10.10.10 is configured with priority 1 to permit and
source IP 10.10.10.10 is configured with priority 2 to deny, access is permitted if the
profile is active, and the second rule is ignored.
11.
Click the
Add
button.
The access rule is added.
Configure Port Authentication
With port-based authentication, when 802.1X is enabled globally and on the port, successful
authentication of any one supplicant attached to the port results in all users being able to use
the port without restrictions. At any time, only one supplicant is allowed to attempt
authentication on a port in this mode. Ports in this mode are under bidirectional control. This
is the default authentication mode.
An 802.1X network includes three components:
•
Authenticators
. The port that is authenticated before system access is permitted.
•
Supplicants
. The host connected to the authenticated port requesting access to the
system services.
•
Authentication Server
. The external server, for example, the RADIUS server that
performs the authentication on behalf of the authenticator, and indicates whether the user
is authorized to access system services.