![Planet IGSW-2840 User Manual Download Page 294](http://html1.mh-extra.com/html/planet/igsw-2840/igsw-2840_user-manual_1563287294.webp)
User’s Manual of IGSW-2840
294
4.11.10 Client Security
This Industrial Managed Switch supports many methods of segregating traffic for clients attached to each of the data ports, and
for ensuring that only authorized clients gain access to the network. Private VLANs and port-based authentication using IEEE
802.1X are commonly used for these purposes. In addition to these methods, several other options of providing client security
are supported by this switch. These include port-based authentication, which can be configured for network client access by
specifying a fixed set of MAC addresses. The addresses assigned to DHCP clients can also be carefully controlled using static
or dynamic bindings with the IP Source Guard and DHCP Snooping commands.
This Industrial Managed Switch provides client security using the following options:
•
Private VLANs
– Provide port-based security and isolation between ports within the assigned VLAN. (See “
Private VLANs
”)
•
Port Security
– Configure secure addresses for individual ports.
•
802.1X
– Use IEEE 802.1X port authentication to control access to specific ports. (See “
Configuring 802.1X Port
Authentication
”.)
•
Web Authentication
- Allows stations to authenticate and access the network in situations where 802.1X or Network Access
authentication methods are infeasible or impractical.
•
Network Access
- Configures MAC authentication and dynamic VLAN assignment.
•
ACL
-Access Control Lists provide packet filtering for IP frames (based on address, protocol, Layer 4 protocol port number or
TCP control code) or any frames (based on MAC address or Ethernet type).
•
DHCP Snooping
– Filters IP traffic on unsecure ports for which the source address cannot be identified via DHCP snooping
nor static source bindings. (See “
DHCP Snooping
”.)
•
IP Source Guard
– Filters untrusted DHCP messages on unsecure ports by building and maintaining a DHCP snooping
binding table. (See “
IP Source Guard
”.)
The priority of execution for the filtering commands is Port Security, Port Authentication,
Network Access, Web Authentication, Access Control Lists, IP Source Guard, and then
DHCP Snooping.
Summary of Contents for IGSW-2840
Page 23: ...User s Manual of IGSW 2840 23 A 2 10 100Mbps 10 100Base TX 665 APPENDEX B GLOSSARY 667 ...
Page 110: ...User s Manual of IGSW 2840 110 Figure 4 3 14 SNMPv3 View Edit screenshot ...
Page 119: ...User s Manual of IGSW 2840 119 Figure 4 4 7 Mirror Port Configuration screenshot ...
Page 205: ...User s Manual of IGSW 2840 205 Multicast Service Multicast flooding ...
Page 216: ...User s Manual of IGSW 2840 216 Figure 4 9 7 IGMP Member Port Table screenshot ...
Page 280: ...User s Manual of IGSW 2840 280 Figure 4 11 19 SSH Host Key Settings screenshot ...
Page 315: ...User s Manual of IGSW 2840 315 Figure 4 11 44 MAC ACL Settings screenshot ...
Page 317: ...User s Manual of IGSW 2840 317 Figure 4 11 46 ACL Port Binding Settings screenshot ...
Page 431: ...User s Manual of IGSW 2840 431 tacacs 1 Console ...