SMC Networks SMC6624M Switch User Manual


 
vi
Contents
How the Switch Lists Trunk Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27
Outbound Traffic Distribution Across Trunked Links . . . . . . . . . . . . 6-27
7 Using Passwords, Port Security, and Authorized IP
Managers To Protect Against Unauthorized Access
Using Password Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Menu: Setting Manager and Operator passwords . . . . . . . . . . . . . . . . . 7-3
CLI: Setting Manager and Operator Passwords . . . . . . . . . . . . . . . . . . . 7-5
Web: Configuring User Names and Passwords . . . . . . . . . . . . . . . . . . . 7-6
Configuring and Monitoring Port Security . . . . . . . . . . . . . . . . . . . . . . 7-7
Basic Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
Blocking Unauthorized Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8
Trunk Group Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
Planning Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
CLI: Port Security Command Options and Operation . . . . . . . . . . . . 7-11
CLI: Displaying Current Port Security Settings . . . . . . . . . . . . . . 7-14
CLI: Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15
Web: Displaying and Configuring Port Security Features . . . . . . . . . 7-20
Reading Intrusion Alerts and Resetting Alert Flags . . . . . . . . . . . . . . 7-20
Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20
How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . 7-21
Keeping the Intrusion Log Current by Resetting Alert Flags . . . 7-21
Menu: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
CLI: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-23
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . 7-25
Web: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26
Using IP Authorized Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-29
Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . . 7-29
Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-30
Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 7-31
CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 7-32
Listing the Switch’s Current Authorized IP Manager(s) . . . . . . . 7-32
Configuring IP Authorized Managers for the Switch . . . . . . . . . . 7-33