Netgear CSM4532 Product Data Sheet - Page 9

Quality of Service Features

Page 9 highlights

100GE-Enabled Managed Switches Data Sheet M4500 series MAC-based Port Security RADIUS Client TACACS+ Client Dot1x Authentication (IEEE 802.1X) MAC Authentication Bypass DHCP Snooping DHCPv6 Snooping Dynamic ARP Inspection IP Source Address Guard Quality of Service Features Access Control Lists (ACL) ACL Remarks • The port security feature limits access on a port to users with specific MAC addresses. These addresses are manually defined or learned on that port. When a frame is seen on a locked port, and the frame source MAC address is not tied to that port, the protection mechanism is invoked. • The switch has a Remote Authentication Dial In User Service (RADIUS) client and can support up to 32 authentication and accounting RADIUS servers. • The switch has a TACACS+ client. TACACS+ provides centralized security for validation of users accessing the switch. TACACS+ provides a centralized user management system while still retaining consistency with RADIUS and other authentication processes. • Dot1x authentication enables the authentication of system users through a local internal server or an external server. Only authenticated and approved system users can transmit and receive data. Supplicants are authenticated using the Extensible Authentication Protocol (EAP). Also supported are PEAP, EAP-TTL, EAP- TTLS, and EAP-TLS. M4500 supports RADIUS-based assignment (via 802.1X) of VLANs, including guest and unauthenticated VLANs. The Dot1X feature also supports RADIUS-based assignment of filter IDs as well as MAC-based authentication, which allows multiple supplicants connected to the same port to each authenticate individually. • The switch supports the MAC-based Authentication Bypass (MAB) feature, which provides 802.1xunaware clients (such as printers and fax machines) controlled access to the network using the devices' MAC address as an identifier. This requires that the known and allowable MAC address and corresponding access rights be pre-populated in the authentication server. MAB works only when the port control mode of the port is MAC- based. • DHCP Snooping is a security feature that monitors DHCP messages between a DHCP client and DHCP server. It filters harmful DHCP messages and builds a bindings database of (MAC address, IP address, VLAN ID, port) tuples that are specified as authorized. DHCP snooping can be enabled globally and on specific VLANs. Ports within the VLAN can be configured to be trusted or untrusted. DHCP servers must be reached through trusted ports. This feature is supported for both IPv4 and IPv6 packets. In an IPv6 domain, a node can obtain an IPv6 address using the following mechanisms: • IPv6 address auto-configuration using router advertisements • The DHCPv6 protocol In a typical man-in-the-middle (MiM) attack, the attacker can snoop or spoof the traffic act as a rogue DHCPv6 server. To prevent such attacks, DHCPv6 snooping helps to secure the IPv6 address configuration in the network. DHCPv6 snooping enables the Brocade device to filter untrusted DHCPv6 packets in a subnet on an IPv6 network. DHCPv6 snooping can ward off MiM attacks, such as a malicious user posing as a DHCPv6 server sending false DHCPv6 server reply packets with the intention of misdirecting other users. DHCPv6 snooping can also stop unauthorized DHCPv6 servers and prevent errors due to user misconfiguration of DHCPv6 servers. • Dynamic ARP Inspection (DAI) is a security feature that rejects invalid and malicious ARP packets. The feature prevents a class of man-in-the-middle attacks, where an unfriendly station intercepts traffic for other stations by poisoning the ARP caches of its unsuspecting neighbors. The malicious station sends ARP requests or responses mapping another station's IP address to its own MAC address. • IP Source Guard and Dynamic ARP Inspection use the DHCP snooping bindings database. When IP Source Guard is enabled, the switch drops incoming packets that do not match a binding in the bindings database. IP Source Guard can be configured to enforce just the source IP address or both the source IP address and source MAC address. Dynamic ARP Inspection uses the bindings database to validate ARP packets. This feature is supported for both IPv4 and IPv6 packets. Access Control Lists (ACLs) ensure that only authorized users have access to specific resources while blocking off any unwarranted attempts to reach network resources. ACLs are used to provide traffic flow control, restrict contents of routing updates, decide which types of traffic are forwarded or blocked, and above all provide security for the network. M4500 supports the following ACL types: • IPv4 ACLs • IPv6 ACLs • MAC ACLs For all ACL types, you can apply the ACL rule when the packet enters or exits the physical port, Port-channel, or VLAN interface (ingress and egress ACLs). • Users can use ACL remarks to include comments for ACL rule entries in any MAC ACL. Remarks assist the user in understanding ACL rules easily. Page 9 of 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29

MAC-based Port Security
The port security feature limits access on a port to users with specific MAC addresses. These addresses
are manually defined or learned on that port. When a frame is seen on a locked port, and the frame source
MAC address is not tied to that port, the protection mechanism is invoked.
RADIUS Client
The switch has a Remote Authentication Dial In User Service (RADIUS) client and can support up to 32
authentication and accounting RADIUS servers.
TACACS+ Client
The switch has a TACACS+ client. TACACS+ provides centralized security for validation of users accessing
the switch. TACACS+ provides a centralized user management system while still retaining consistency with
RADIUS and other authentication processes.
Dot1x Authentication (IEEE 802.1X)
Dot1x authentication enables the authentication of system users through a local internal server or an
external server. Only authenticated and approved system users can transmit and receive data. Supplicants
are authenticated using the Extensible Authentication Protocol (EAP). Also supported are PEAP, EAP-TTL,
EAP- TTLS, and EAP-TLS. M4500 supports RADIUS-based assignment (via 802.1X) of VLANs, including
guest and unauthenticated VLANs. The Dot1X feature also supports RADIUS-based assignment of filter
IDs as well as MAC-based authentication, which allows multiple supplicants connected to the same port to
each authenticate individually.
MAC Authentication Bypass
The switch supports the MAC-based Authentication Bypass (MAB) feature, which provides 802.1x-
unaware clients (such as printers and fax machines) controlled access to the network using the devices’
MAC address as an identifier. This requires that the known and allowable MAC address and corresponding
access rights be pre-populated in the authentication server. MAB works only when the port control mode
of the port is MAC- based.
DHCP Snooping
DHCP Snooping is a security feature that monitors DHCP messages between a DHCP client and DHCP
server. It filters harmful DHCP messages and builds a bindings database of (MAC address, IP address, VLAN
ID, port) tuples that are specified as authorized. DHCP snooping can be enabled globally and on specific
VLANs. Ports within the VLAN can be configured to be trusted or untrusted. DHCP servers must be
reached through trusted ports. This feature is supported for both IPv4 and IPv6 packets.
DHCPv6 Snooping
In an IPv6 domain, a node can obtain an IPv6 address using the following mechanisms:
IPv6 address auto-configuration using router advertisements
The DHCPv6 protocol
In a typical man-in-the-middle (MiM) attack, the attacker can snoop or spoof the traffic act as a rogue
DHCPv6 server. To prevent such attacks, DHCPv6 snooping helps to secure the IPv6 address configura-
tion in the network. DHCPv6 snooping enables the Brocade device to filter untrusted DHCPv6 packets in a
subnet on an IPv6 network. DHCPv6 snooping can ward off MiM attacks, such as a malicious user posing as
a DHCPv6 server sending false DHCPv6 server reply packets with the intention of misdirecting other users.
DHCPv6 snooping can also stop unauthorized DHCPv6 servers and prevent errors due to user misconfigura-
tion of DHCPv6 servers.
Dynamic ARP Inspection
Dynamic ARP Inspection (DAI) is a security feature that rejects invalid and malicious ARP packets. The
feature prevents a class of man-in-the-middle attacks, where an unfriendly station intercepts traffic for
other stations by poisoning the ARP caches of its unsuspecting neighbors. The malicious station sends ARP
requests or responses mapping another station’s IP address to its own MAC address.
IP Source Address Guard
IP Source Guard and Dynamic ARP Inspection use the DHCP snooping bindings database. When IP Source
Guard is enabled, the switch drops incoming packets that do not match a binding in the bindings database.
IP Source Guard can be configured to enforce just the source IP address or both the source IP address and
source MAC address. Dynamic ARP Inspection uses the bindings database to validate ARP packets. This
feature is supported for both IPv4 and IPv6 packets.
Quality of Service Features
Access Control Lists (ACL)
Access Control Lists (ACLs) ensure that only authorized users have access to specific resources while block-
ing off any unwarranted attempts to reach network resources. ACLs are used to provide traffic flow control,
restrict contents of routing updates, decide which types of traffic are forwarded or blocked, and above all
provide security for the network. M4500 supports the following ACL types:
IPv4 ACLs
IPv6 ACLs
MAC ACLs
For all ACL types, you can apply the ACL rule when the packet enters or exits the physical port, Port-channel,
or VLAN interface (ingress and egress ACLs).
ACL Remarks
Users can use ACL remarks to include comments for ACL rule entries in any MAC ACL. Remarks assist the
user in understanding ACL rules easily.
100GE-Enabled Managed Switches
Data Sheet
M4500 series
Page 9 of 29