108
C
HAPTER
11: M
AKING
Y
OUR
N
ETWORK
S
ECURE
You can configure DUD to perform one of the following actions if an
unauthorized client device transmits data on the port:
■
Permanently disable the port
The port is disabled and data from the unauthorized client device is
not transmitted.
■
Temporarily disable the port
The port is disabled for 20 seconds. When the time period has expired
the port is re-enabled; if the port is set to one of the Network Login
security modes, the client device is authenticated again.
■
Do not disable the port
The port is not disabled and data from authorized client devices will
continue to be transmitted, whilst data from unauthorized client
devices will be filtered.
What is Switch
Management
Login?
If you intend to manage the Switch using the Web interface or the
Command Line Interface, you need to log in with a valid user name and
password.
For further information on managing the Switch, see the “Setting Up For
Management” chapter in the Switch 4400 Getting Started Guide.
The user name and password information can be stored in either:
■
a RADIUS server
(recommended)
If you enable RADIUS as the authentication mode of Switch
Management Login, the user name and password information is
stored in a database on a RADIUS server in your network. Subsequent
log in attempts to the Switch are remotely authenticated by the
RADIUS server.
or
■
the local Switch database
(default)
If you enable Local as the authentication mode of Switch
Management Login, the user name and password information is
stored in the local database on the Switch. Subsequent login attempts
to the Switch are authenticated by the local database.
Содержание 3C17203 - SuperStack 3 Switch 4400
Страница 8: ...GLOSSARY INDEX ...
Страница 14: ...14 ...
Страница 26: ...26 CHAPTER 1 SWITCH FEATURES OVERVIEW ...
Страница 44: ...44 CHAPTER 3 USING MULTICAST FILTERING ...
Страница 55: ...How STP Works 55 Figure 13 STP configurations ...
Страница 58: ...58 CHAPTER 4 USING RESILIENCE FEATURES ...
Страница 84: ...84 CHAPTER 7 STATUS MONITORING AND STATISTICS ...
Страница 92: ...92 CHAPTER 8 SETTING UP VIRTUAL LANS ...
Страница 98: ...98 CHAPTER 9 USING WEBCACHE SUPPORT ...
Страница 120: ...120 CHAPTER 12 POWER MANAGEMENT AND CONTROL ...
Страница 122: ...122 ...
Страница 126: ...126 APPENDIX A CONFIGURATION RULES ...
Страница 134: ...134 APPENDIX B NETWORK CONFIGURATION EXAMPLES ...
Страница 150: ...150 GLOSSARY ...