10
M
AKING
Y
OUR
N
ETWORK
S
ECURE
This chapter outlines the Port Security and Switch Management Login
features, explains the key benefits of using these features, and gives
examples of how and why you would use them in your network.
For detailed descriptions of the Web interface operations and the
Command Line Interface (CLI) commands that you require to manage the
Switch please refer to the Management Interface Reference Guide
supplied in HTML format on the CD-ROM that accompanies your Switch.
Limiting
Management
Access by IP
Address
The Switch 3226 and Switch 3250 can restrict management access to an
IP address or range of IP addresses using the
trusted IP feature.
You can allow an IP address or range of addresses access to one or more
of the following interfaces:
■
HTTP
■
SSL (HTTPS)
■
SNMP
■
SSH
■
Telnet
Once you enable trusted IP, only those methods and IP addresses that you
have allowed access will be able to manage the Switch. Attempts to
access a management interface from un unauthorized addresses or using
an unauthorized method will be denied.
Before enabling trusted IP 3Com recommends that you add the IP address
of your management station to the list of trusted IP addresses.
The trusted IP feature restricts network access to the management
interfaces of the Switch. You will be able to access the management
Содержание SUPERSTACK 3 3250
Страница 8: ......
Страница 20: ...20 CHAPTER 1 SWITCH FEATURES OVERVIEW...
Страница 43: ...How STP Works 43 Figure 9 STP configurations...
Страница 54: ...54 CHAPTER 6 USING TRAFFIC MANAGEMENT...
Страница 66: ...66 CHAPTER 8 SETTING UP VIRTUAL LANS...
Страница 70: ...70 CHAPTER 9 USING AUTOMATIC IP CONFIGURATION...
Страница 98: ...98 CHAPTER 11 IP ROUTING...
Страница 102: ...102 APPENDIX A CONFIGURATION RULES...
Страница 106: ...106 APPENDIX B NETWORK CONFIGURATION EXAMPLES...
Страница 132: ...132 INDEX...