![Planet IGSW-2840 User Manual Download Page 465](http://html1.mh-extra.com/html/planet/igsw-2840/igsw-2840_user-manual_1563287465.webp)
User’s Manual of IGSW-2840
465
Example
Console#
show management all-client
Management IP Filter
HTTP-Client:
Start IP address End IP address
192.168.1.19 192.168.1.19
192.168.1.25 192.168.1.30
SNMP-Client:
Start IP address End IP address
192.168.1.19 192.168.1.19
192.168.1.25 192.168.1.30
TELNET-Client:
Start IP address End IP address
192.168.1.19 192.168.1.19
192.168.1.25 192.168.1.30
Console#
5.13 Client Security Commands
This switch supports many methods of segregating traffic for clients attached to each of the data ports, and for ensuring that only
authorized clients gain access to the network. Private VLANs and port-based authentication using IEEE 802.1X are commonly
used for these purposes. In addition to these methods, several other options of providing client security are described in this
section. These include port-based authentication, which can be configured to allow network client access by specifying a fixed
set of MAC addresses. The addresses assigned to DHCP clients can also be carefully controlled using static or dynamic
bindings with the IP Source Guard and DHCP Snooping commands.
Table 4-40 Client Security Commands
Command Group
Function
Private VLANs
Configures private VLANs, including uplink and downlink ports
Port Security*
Configures secure addresses for a port
Port Authentication*
Configures host authentication on specific ports using 802.1X
Network Access*
Configures MAC authentication and dynamic VLAN assignment
Web Authentication*
Configures Web authentication
Access Control Lists*
Provides filtering for IP frames (based on address, protocol, TCP/UDP port
number or TCP control code) or non-IP frames (based on MAC address or
Ethernet type)
DHCP Snooping*
Filters untrusted DHCP messages on unsecure ports by buildingand
maintaining a DHCP snooping binding table
IP Source Guard*
Filters IP traffic on unsecure ports for which the source address cannot be
identified via DHCP snooping nor static source bindings
Summary of Contents for IGSW-2840
Page 23: ...User s Manual of IGSW 2840 23 A 2 10 100Mbps 10 100Base TX 665 APPENDEX B GLOSSARY 667 ...
Page 110: ...User s Manual of IGSW 2840 110 Figure 4 3 14 SNMPv3 View Edit screenshot ...
Page 119: ...User s Manual of IGSW 2840 119 Figure 4 4 7 Mirror Port Configuration screenshot ...
Page 205: ...User s Manual of IGSW 2840 205 Multicast Service Multicast flooding ...
Page 216: ...User s Manual of IGSW 2840 216 Figure 4 9 7 IGMP Member Port Table screenshot ...
Page 280: ...User s Manual of IGSW 2840 280 Figure 4 11 19 SSH Host Key Settings screenshot ...
Page 315: ...User s Manual of IGSW 2840 315 Figure 4 11 44 MAC ACL Settings screenshot ...
Page 317: ...User s Manual of IGSW 2840 317 Figure 4 11 46 ACL Port Binding Settings screenshot ...
Page 431: ...User s Manual of IGSW 2840 431 tacacs 1 Console ...