AMX NXA-ENET24 Switch User Manual


 
User Authentication
64
NXA-ENET24 - Software Management Guide
Configuring the SSH Server - Web
Click Security, SSH, Settings. Enable SSH and adjust the authentication parameters as required, then click
Apply. Note that you must first generate the host key pair on the SSH Host-Key Settings page before you can
enable the SSH server.
Configuring the SSH Server - CLI
This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows
that the administrator has made a connection via SHH, and then disables this connection.
Configuring Port Security
Port security is a feature that allows you to configure a switch port with one or more device MAC addresses
that are authorized to access the network through that port.
When port security is enabled on a port, the switch stops learning new MAC addresses on the specified port.
Only incoming traffic with source addresses already stored in the dynamic or static address table will be
accepted as authorized to access the network through that port. If a device with an unauthorized MAC address
attempts to use the switch port, the intrusion will be detected and the switch can automatically take action by
disabling the port and sending a trap message.
To use port security, first allow the switch to dynamically learn the <source MAC address, VLAN> pair for
frames received on a port for an initial training period, and then enable port security to stop address learning.
Be sure you enable the learning function long enough to ensure that all valid VLAN members have been
registered on the selected port. Note that you can also restrict the maximum number of addresses that can be
learned by a port.
To add new VLAN members at a later time, you can manually add secure addresses with the Static Address
Table (see the Address Table Settings section on page 109), or turn off port
security to re-enable the learning
function long enough for new VLAN members
to be registered. Learning may then be disabled again, if
desired, for security.
FIG. 59 Web - SSH Server Settings
FIG. 60 CLI - SSH Server Settings