GS716Tv2 and GS724Tv3 Software Administration Manual
viii
v1.0, July 2009
Chapter
5
Managing Device Security
Management Security Settings
.......................................................................................
5-1
Change Password
....................................................................................................
5-2
RADIUS Configuration
.............................................................................................
5-3
Configuring TACACS+
...........................................................................................
5-10
Authentication List Configuration
...........................................................................
5-13
Configuring Management Access
.................................................................................
5-15
HTTP Configuration
...............................................................................................
5-15
Secure HTTP Configuration
...................................................................................
5-16
Certificate Download
..............................................................................................
5-18
Access Profile Configuration
..................................................................................
5-19
Access Rule Configuration
.....................................................................................
5-21
Port Authentication
.......................................................................................................
5-22
802.1X Configuration
.............................................................................................
5-23
Port Authentication
.................................................................................................
5-24
Port Summary
........................................................................................................
5-28
Traffic Control
...............................................................................................................
5-30
MAC Filter Configuration
........................................................................................
5-30
MAC Filter Summary
..............................................................................................
5-32
Storm Control
.........................................................................................................
5-33
Port Security Configuration
....................................................................................
5-34
Port Security Interface Configuration
.....................................................................
5-35
Security MAC Address
...........................................................................................
5-37
Protected Ports Membership
..................................................................................
5-38
Configuring Access Control Lists
..................................................................................
5-39
MAC ACL
...............................................................................................................
5-40
MAC Rules
.............................................................................................................
5-42
MAC Binding Configuration
....................................................................................
5-44
MAC Binding Table
................................................................................................
5-45
IP ACL
....................................................................................................................
5-47
IP Rules
..................................................................................................................
5-48
IP Extended Rule
...................................................................................................
5-50
IP Binding Configuration
........................................................................................
5-54
IP Binding Table
.....................................................................................................
5-56