Netgear FS728TLP Web Management User Guide - Page 314

X Authentication, Security > ACL > Advanced > IP Binding Configuration

Page 314 highlights

ProSAFE FS526Tv2, FS726Tv2, and FS728TLP Smart Switches 6. Select Security > ACL > Advanced > IP Binding Configuration. The IP Binding Configuration screen displays. 7. Assign IP ACL ID 1 to interfaces 2, 3, and 4, and assign a sequence number of 1. By default, this IP ACL is bound on the inbound direction, so it examines traffic as it enters the smart switch. For more information about configuring IP ACL bindings, see Configure IP ACL Bindings for Ports and LAGs on page 216. The IP ACL with ID 1 functions in the following way: The IP ACL matches all packets with the source IP address and subnet mask of the finance department's network and denies these packets on ports 2, 3, and 4. The second rule permits all nonfinance traffic on the ports. The second rule is required because the configuration includes a default deny all IP traffic rule as the lowest-priority rule of the IP ACL table. 802.1X Authentication LANs are often deployed in environments that permit unauthorized devices to be physically attached to the LAN infrastructure, or permit unauthorized users to attempt to access the LAN through equipment already attached. In such environments, it can be desirable to restrict access to the services offered by the LAN to those users and devices that are permitted to use those services. Port-based network access control uses the physical characteristics of LAN infrastructures to allow for authentication and authorization of devices that are attached to a LAN port. In this context, a port is a single point of attachment to the LAN, such as ports of MAC bridges and associations between stations or access points in wireless LANs. The IEEE 802.1X standard describes an architectural framework within which authentication and consequent actions occur. It also establishes the requirements for a protocol between the authenticator (the system that passes an authentication request to the authentication server) and the supplicant (the system that requests authentication), and between the authenticator and the authentication server. The smart switch supports a guest VLAN, which allows unauthenticated users to have limited access to the network resources. Note: You can use QoS features to provide rate limiting on the guest VLAN to limit the network resources on the guest VLAN. Another 802.1X feature is the ability to configure a port for Extensible Authentication Protocol over LAN (EAPoL) packet forwarding. You can disable or enable the forwarding of EAPoL when 802.1X is disabled on the smart switch. Configuration Examples 314

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335

Configuration Examples
314
ProSAFE FS526Tv2, FS726Tv2, and FS728TLP Smart Switches
6.
Select
Security > ACL > Advanced > IP Binding Configuration
.
The IP Binding Configuration screen displays.
7.
Assign IP ACL ID 1 to interfaces 2, 3, and 4, and assign a sequence number of 1.
By default, this IP ACL is bound on the inbound direction, so it examines traffic as it
enters the smart switch.
For more information about configuring IP ACL bindings, see
Configure IP ACL Bindings for
Ports and LAGs
on page
216.
The IP ACL with ID 1 functions in the following way:
The IP ACL matches all packets with the source IP address and subnet mask of the finance
department’s network and denies these packets on ports 2, 3, and 4. The second rule permits
all nonfinance traffic on the ports. The second rule is required because the configuration
includes a default
deny all IP traffic
rule as the lowest-priority rule of the IP ACL table.
802.1X Authentication
LANs are often deployed in environments that permit unauthorized devices to be physically
attached to the LAN infrastructure, or permit unauthorized users to attempt to access the LAN
through equipment already attached. In such environments, it can be desirable to restrict
access to the services offered by the LAN to those users and devices that are permitted to
use those services.
Port-based network access control uses the physical characteristics of LAN infrastructures to
allow for authentication and authorization of devices that are attached to a LAN port. In this
context, a port is a single point of attachment to the LAN, such as ports of MAC bridges and
associations between stations or access points in wireless LANs.
The IEEE 802.1X standard describes an architectural framework within which authentication
and consequent actions occur. It also establishes the requirements for a protocol between
the authenticator (the system that passes an authentication request to the authentication
server) and the supplicant (the system that requests authentication), and between the
authenticator and the authentication server.
The smart switch supports a guest VLAN, which allows unauthenticated users to have limited
access to the network resources.
Note:
You can use QoS features to provide rate limiting on the guest VLAN
to limit the network resources on the guest VLAN.
Another 802.1X feature is the ability to configure a port for Extensible Authentication Protocol
over LAN (EAPoL) packet forwarding. You can disable or enable the forwarding of EAPoL
when 802.1X is disabled on the smart switch.