
49
4.5. Security
You can configure this switch to authenticate users logging into the system for management
access or to control client access to the data ports.
Management Access Security (Switch menu)
– Management access to the switch can be
controlled through local authentication of user names and passwords stored on the switch, or
remote authentication of users via a RADIUS or server. Additional authentication
methods includes Secure Shell (SSH), Secure Hypertext Transfer Protocol (HTTPS) over the
Secure Socket Layer (SSL), static configuration of client addresses, and SNMP.
General Security Measures (Network menu)
– This switch supports many methods of
segregating traffic for clients attached to each of the data ports, and for ensuring that only
authorized clients gain access to the network. Private VLANs and port-based authentication
using IEEE 802.1X are commonly used for these purposes. In addition to these methods,
several other options of providing client security are supported by this switch. These include
limiting the number of users accessing a port. The addresses assigned to DHCP clients can
also be carefully controlled using static or dynamic bindings with DHCP Snooping and IP
Source Guard commands.
ARP Inspection can also be used to validate the MAC address bindings for ARP packets,
providing protection against ARP traffic with invalid MAC to IP address bindings, which forms
the basis for “man-in-the- middle” attacks.
Switch Security
Users Configuration
Use the User Configuration page to control management access to the switch based on
manually configured user names and passwords.
PATH
Configuration \ Security \ Switch \ Users
Figure 12: Configuring User Accounts
Содержание GEP-1070
Страница 80: ...80 authentication from any point within the network...
Страница 168: ...168...