– 223 –
12
Security Measures
You can configure this switch to authenticate users logging into the system for
management access using local or remote authentication methods. Port-based
authentication using IEEE 802.1X can also be configured to control either
management access to the uplink ports or client access to the data ports. This
switch provides secure network management access using the following options:
◆
– Use local or remote authentication to configure access rights, specify
authentication servers, configure remote authentication and accounting.
◆
– Manually configure access rights on the switch for specified
users.
◆
- Configure MAC authentication, intrusion response, dynamic
VLAN assignment, and dynamic QoS assignment.
◆
– Provide a secure web connection.
◆
– Provide a secure shell (for secure Telnet access).
◆
– Access Control Lists provide packet filtering for IP frames (based on
address, protocol, Layer 4 protocol port number or TCP control code).
◆
– Security feature that validates the MAC Address bindings for
Address Resolution Protocol packets. Provides protection against ARP traffic
with invalid MAC to IP Address bindings, which forms the basis for certain
“man-in-the-middle” attacks.
◆
– Filters management access to the web, SNMP or Telnet interface.
◆
– Configure secure addresses for individual ports.
◆
– Use IEEE 802.1X port authentication to control access to
specific ports.
◆
– Filter IP traffic on insecure ports for which the source address
cannot be identified via DHCP snooping.
◆
– Protects against Denial-of-Service attacks.
◆
– Filters IPv4 traffic on insecure ports for which the source
address cannot be identified via DHCPv4 snooping nor static source bindings.
Содержание GEL-1061
Страница 14: ...Contents 14...
Страница 28: ...Section I Getting Started 28...
Страница 38: ...Chapter 1 Introduction System Defaults 38...
Страница 40: ...Section II Web Configuration 40...
Страница 60: ...Chapter 2 Using the Web Interface Navigating the Web Browser Interface 60...
Страница 164: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 164...
Страница 192: ...Chapter 8 Congestion Control Storm Control 192...
Страница 204: ...Chapter 9 Class of Service Layer 3 4 Priority Settings 204...
Страница 216: ...Chapter 10 Quality of Service Attaching a Policy Map to a Port 216...
Страница 430: ...Chapter 14 Multicast Filtering MLD Snooping Snooping and Query for IPv4 430...
Страница 436: ...Chapter 15 IP Tools Address Resolution Protocol 436...
Страница 450: ...Chapter 16 IP Services Dynamic Host Configuration Protocol 450 Figure 301 Enabling Dynamic Provisioning via DHCP...
Страница 474: ...Section III Appendices 474...
Страница 492: ...Glossary 492...
Страница 500: ...E052016 ST R02 150200001416A...