Command Line Interface
4-148
4
General Security Measures
This switch supports many methods of segregating traffic for clients attached to
each of the data ports, and for ensuring that only authorized clients gain access to
the network. Private VLANs and port-based authentication using IEEE 802.1X are
commonly used for these purposes. In addition to these methods, several other
options of providing client security are described in this section. These include
port-based authentication, which can be configured to allow network client access
by specifying a fixed set of MAC addresses. The addresses assigned to DHCP
clients can also be carefully controlled using static or dynamic bindings with the IP
Source Guard and DHCP Snooping commands.
Table 4-41 Client Security Commands
Command Group
Function
Page
Private VLANs
Configures private VLANs, including uplink and downlink ports
Port Security
*
* The priority of execution for these filtering commands is Port Security, Port Authentication, Network Access,
Web Authentication, Access Control Lists, DHCP Snooping, and then IP Source Guard.
Configures secure addresses for a port
Port Authentication
Configures host authentication on specific ports using 802.1X
Network Access
Configures MAC authentication and dynamic VLAN assignment
Web Authentication
Configures Web authentication
Access Control Lists
Provides filtering for IP frames (based on address, protocol, TCP/
UDP port number or TCP control code) or non-IP frames (based on
MAC address or Ethernet type)
DHCP Snooping
Filters untrusted DHCP messages on unsecure ports by building
and maintaining a DHCP snooping binding table
IP Source Guard
Filters IP traffic on unsecure ports for which the source address
cannot be identified via DHCP snooping nor static source bindings
Summary of Contents for iES4024GP
Page 1: ...iES4028F 4028FP 4024GP ...
Page 4: ...iv This page is intentionally left blank ...
Page 10: ...x This page is intentionally left blank ...
Page 28: ...Contents xxviii This page is intentionally left blank ...
Page 32: ...Tables xxxii This page is intentionally left blank ...
Page 46: ...Introduction 1 10 1 This page is intentionally left blank ...
Page 336: ...Configuring the Switch 3 280 3 This page is intentionally left blank ...
Page 688: ...Command Line Interface 4 352 4 This page is intentionally left blank ...
Page 702: ...Glossary Glossary 8 This page is intentionally left blank ...
Page 710: ...Index 8 Index This page is intentionally left blank ...
Page 711: ...This page is intentionally left blank ...
Page 712: ...iES4028F 4028FP 4024GP ...