Command Line Interface
4-158
4
General Security Measures
This switch supports many methods of segregating traffic for clients attached to
each of the data ports, and for ensuring that only authorized clients gain access to
the network. Private VLANs and port-based authentication using IEEE 802.1X are
commonly used for these purposes. In addition to these methods, several other
options of providing client security are described in this section. These include
port-based authentication, which can be configured to allow network client access
by specifying a fixed set of MAC addresses. The addresses assigned to DHCP
clients can also be carefully controlled using static or dynamic bindings with the IP
Source Guard and DHCP Snooping commands.
Table 4-41 Client Security Commands
Command Group
Function
Page
Private VLANs
Configures private VLANs, including uplink and downlink ports
4-322
Port Security
*
* The priority of execution for these filtering commands is Port Security, Port Authentication, Network Access, Web
Authentication, Access Control Lists, DHCP Snooping, and then IP Source Guard.
Configures secure addresses for a port
4-159
Port Authentication
*
Configures host authentication on specific ports using 802.1X
4-146
Network Access
*
Configures MAC authentication and dynamic VLAN assignment
4-161
Web Authentication
*
Configures Web authentication
4-174
Access Control Lists
*
Provides filtering for IPv4 frames (based on address, protocol,
Layer 4 protocol port number or TCP control code), IPv6 frames
(based on address, next header type, or flow label), or non-IP
frames (based on MAC address or Ethernet type)
4-199
DHCP Snooping
*
Filters untrusted DHCP messages on insecure ports by building and
maintaining a DHCP snooping binding table
4-179
IP Source Guard
*
Filters IP traffic on insecure ports for which the source address
cannot be identified via DHCP snooping nor static source bindings
4-187
ARP Inspection
Validates the MAC-to-IP address bindings in ARP packets
4-191
Summary of Contents for 6152PL2 FICHE
Page 2: ......
Page 6: ...vi ...
Page 8: ...viii ...
Page 32: ...Tables xxxii ...
Page 38: ...Figures xxxviii ...
Page 56: ...Initial Configuration 2 10 2 ...
Page 378: ...Configuring the Switch 3 322 3 ...
Page 817: ......