Configuring the Switch
3-96
3
CLI
– This example allows SNMP access for a specific client.
General Security Measures
This switch supports many methods of segregating traffic for clients attached to
each of the data ports, and for ensuring that only authorized clients gain access to
the network. Private VLANs and port-based authentication using IEEE 802.1X are
commonly used for these purposes. In addition to these methods, several other
options of providing client security are supported by this switch. These include
port-based authentication, which can be configured for network client access
by specifying a fixed set of MAC addresses. The addresses assigned to DHCP
clients can also be carefully controlled using static or dynamic bindings with the IP
Source Guard and DHCP Snooping commands.
This switch provides client security using the following options:
• Private VLANs – Provide port-based security and isolation between ports within the
assigned VLAN. (See “Private VLANs” on page 3-209.)
• Port Security – Configure secure addresses for individual ports.
• 802.1X – Use IEEE 802.1X port authentication to control access to specific ports.
(See “Configuring 802.1X Port Authentication” on page 3-88.)
• Web Authentication - Allows stations to authenticate and access the network in
situations where 802.1X or Network Access authentication methods are infeasible
or impractical.
• Network Access - Configures MAC authentication and dynamic VLAN assignment.
• ACL - Access Control Lists provide packet filtering for IP frames (based on
address, protocol, Layer 4 protocol port number or TCP control code) or any
frames (based on MAC address or Ethernet type).
• DHCP Snooping – Filters IP traffic on unsecure ports for which the source address
cannot be identified via DHCP snooping nor static source bindings. (See “DHCP
Snooping” on page 3-116.)
Console(config)#management snmp-client 10.1.2.3
Console(config)#end
Console#show management all-client
Management IP Filter
HTTP-Client:
Start IP address End IP address
-----------------------------------------------
SNMP-Client:
Start IP address End IP address
-----------------------------------------------
1. 10.1.2.3 10.1.2.3
TELNET-Client:
Start IP address End IP address
-----------------------------------------------
Console#
Содержание iES4024GP
Страница 1: ...iES4028F 4028FP 4024GP ...
Страница 2: ...iES4028F iES4028FP iES4024GP E082008 ST R03 149100041800A 149100040200A 149100041700A 149100000020A ...
Страница 4: ...iv This page is intentionally left blank ...
Страница 10: ...x This page is intentionally left blank ...
Страница 28: ...Contents xxviii This page is intentionally left blank ...
Страница 32: ...Tables xxxii This page is intentionally left blank ...
Страница 46: ...Introduction 1 10 1 This page is intentionally left blank ...
Страница 336: ...Configuring the Switch 3 280 3 This page is intentionally left blank ...
Страница 688: ...Command Line Interface 4 352 4 This page is intentionally left blank ...
Страница 702: ...Glossary Glossary 8 This page is intentionally left blank ...
Страница 710: ...Index 8 Index This page is intentionally left blank ...
Страница 711: ...This page is intentionally left blank ...
Страница 712: ...iES4028F 4028FP 4024GP ...