SMC Networks SMC TigerStack II SMC6624M User Manual

Page 10

Advertising
background image

vi

Contents

How the Switch Lists Trunk Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27

Outbound Traffic Distribution Across Trunked Links . . . . . . . . . . . . 6-27

7 Using Passwords, Port Security, and Authorized IP

Managers To Protect Against Unauthorized Access

Using Password Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2

Menu: Setting Manager and Operator passwords . . . . . . . . . . . . . . . . . 7-3

CLI: Setting Manager and Operator Passwords . . . . . . . . . . . . . . . . . . . 7-5

Web: Configuring User Names and Passwords . . . . . . . . . . . . . . . . . . . 7-6

Configuring and Monitoring Port Security

. . . . . . . . . . . . . . . . . . . . . . 7-7

Basic Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7

Blocking Unauthorized Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8
Trunk Group Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9

Planning Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9

CLI: Port Security Command Options and Operation . . . . . . . . . . . . 7-11

CLI: Displaying Current Port Security Settings . . . . . . . . . . . . . . 7-14
CLI: Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15

Web: Displaying and Configuring Port Security Features . . . . . . . . . 7-20

Reading Intrusion Alerts and Resetting Alert Flags . . . . . . . . . . . . . . 7-20

Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20
How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . 7-21
Keeping the Intrusion Log Current by Resetting Alert Flags . . . 7-21
Menu: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
CLI: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-23
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . 7-25
Web: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26

Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26

Using IP Authorized Managers

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28

Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-29

Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . . 7-29

Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-30

Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 7-31

CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 7-32

Listing the Switch’s Current Authorized IP Manager(s) . . . . . . . 7-32
Configuring IP Authorized Managers for the Switch . . . . . . . . . . 7-33

Advertising