
GS716Tv2 and GS724Tv3 Software Administration Manual
viii
v1.0, July 2009
Chapter
5
Managing Device Security
Management Security Settings .......................................................................................5-1
Change Password ....................................................................................................5-2
RADIUS Configuration .............................................................................................5-3
Configuring ...........................................................................................5-10
Authentication List Configuration ...........................................................................5-13
Configuring Management Access .................................................................................5-15
HTTP Configuration ...............................................................................................5-15
Secure HTTP Configuration ...................................................................................5-16
Certificate Download ..............................................................................................5-18
Access Profile Configuration ..................................................................................5-19
Access Rule Configuration .....................................................................................5-21
Port Authentication .......................................................................................................5-22
802.1X Configuration .............................................................................................5-23
Port Authentication .................................................................................................5-24
Port Summary ........................................................................................................5-28
Traffic Control ...............................................................................................................5-30
MAC Filter Configuration ........................................................................................5-30
MAC Filter Summary ..............................................................................................5-32
Storm Control .........................................................................................................5-33
Port Security Configuration ....................................................................................5-34
Port Security Interface Configuration .....................................................................5-35
Security MAC Address ...........................................................................................5-37
Protected Ports Membership ..................................................................................5-38
Configuring Access Control Lists ..................................................................................5-39
MAC ACL ...............................................................................................................5-40
MAC Rules .............................................................................................................5-42
MAC Binding Configuration ....................................................................................5-44
MAC Binding Table ................................................................................................5-45
IP ACL ....................................................................................................................5-47
IP Rules ..................................................................................................................5-48
IP Extended Rule ...................................................................................................5-50
IP Binding Configuration ........................................................................................5-54
IP Binding Table .....................................................................................................5-56