
Client Security Commands
4-109
4
Client Security Commands
This switch supports many methods of segregating traffic for clients attached to
each of the data ports, and for ensuring that only authorized clients gain access to
the network. Private VLANs and port-based authentication using IEEE 802.1X are
commonly used for these purposes. In addition to these methods, several other
options of providing client security are described in this section. These include
port-based authentication, which can be configured to allow network client access
by specifying a fixed set of MAC addresses. The addresses assigned to DHCP
clients can also be carefully controlled using static or dynamic bindings with the IP
Source Guard and DHCP Snooping commands.
Port Security Commands
These commands can be used to enable port security on a port. When using port
security, the switch stops learning new MAC addresses on the specified port when it
has reached a configured maximum number. Only incoming traffic with source
addresses already stored in the dynamic or static address table for this port will be
authorized to access the network. The port will drop any incoming frames with a
source MAC address that is unknown or has been previously learned from another
port. If a device with an unauthorized MAC address attempts to use the switch port,
the intrusion will be detected and the switch can automatically take action by
disabling the port and sending a trap message.
Table 4-1 Client Security Commands
Command Group
Function
Page
Private VLANs
Configures private VLANs, including uplink and downlink ports
Port Authentication
Configures host authentication on specific ports using 802.1X
Port Security
*
* The priority of execution for these filtering commands is
Port Security, Access Control Lists, IP Source
Guard, and then DHCP Snooping
.
Configures secure addresses for a port
Access Control Lists
Provides filtering for IP frames (based on address, protocol, TCP/
UDP port number or TCP control code) or non-IP frames (based on
MAC address or Ethernet type)
IP Source Guard
Filters IP traffic on unsecure ports for which the source address
cannot be identified via DHCP snooping nor static source bindings
DHCP Snooping
Filters untrusted DHCP messages on unsecure ports by building
and maintaining a DHCP snooping binding table
Table 4-1 Port Security Commands
Command
Function
Mode
Page
port security
Configures a secure port
IC
mac-address-table static
Maps a static address to a port in a VLAN
GC
show mac-address-table
Displays entries in the bridge-forwarding database
PE
Содержание ES4524M-PoE
Страница 1: ...Powered by Accton Management Guide ES4524M PoE 24 Port Layer 2 4 Gigabit Ethernet Switch with PoE...
Страница 2: ......
Страница 4: ...ES4524M PoE F1 0 0 5 E012008 ST R01 149100037400A...
Страница 22: ...xviii Tables...
Страница 26: ...xxii Figures...
Страница 34: ...Introduction 1 8 1...
Страница 270: ...Configuring the Switch 3 226...
Страница 404: ...Command Line Interface 4 134 4...
Страница 546: ...Software Specifications A 4 A...
Страница 559: ......
Страница 560: ...ES4524M PoE E012008 ST R01 149100037400A...