Netgear GS716Tv2 GS716Tv2/GS724Tv3 Software Admin Manual - Page 148

Port Authentication, Table, 16. Access Rule Configuration Fields

Page 148 highlights

GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-16. Access Rule Configuration Fields Field Description Rule Type Service Type Select Permit to allow access to the switch administrative pages for traffic that meets the criteria you configure for the rule. Any traffic that does not meet the rules is denied. Select Deny to prohibit access to the switch administrative pages for traffic that meets the criteria you configure for the rule. Any traffic that does not meet the rules is allowed access to the switch. Select the type of service to allow or prohibit from accessing the switch management interface: • SNMP • HTTP • HTTPS Source IP Address Enter Source IP Address of the client originating the management traffic. Enter the address in the Source IP address text box. Mask Priority Enter the subnet mask associated with the IP address. Configure priority to the rule. The rules are validated against the incoming management request in the ascending order of their priorities. If a rule matches, action is performed and subsequent rules below are ignored. For example, if a Source IP 10.10.10.10 is configured with priority 1 to permit, and Source IP 10.10.10.10 is configured with priority 2 to Deny, then access is permitted if the profile is active, and the second rule is ignored. 2. To add an Access Rule, enter information into the appropriate fields and click Add. 3. To delete an Access Rule, select the check box next to the Rule Type, and then click Delete. 4. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 5. If you make changes to the page, click Apply to apply the changes to the system. Port Authentication In port-based authentication mode, when 802.1X is enabled globally and on the port, successful authentication of any one supplicant attached to the port results in all users being able to use the port without restrictions. At any given time, only one supplicant is allowed to attempt authentication on a port in this mode. Ports in this mode are under bidirectional control. This is the default authentication mode. 5-22 v1.0, July 2009 Managing Device Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

GS716Tv2 and GS724Tv3 Software Administration Manual
5-22
Managing Device Security
v1.0, July 2009
2.
To add an Access Rule, enter information into the appropriate fields and click
Add
.
3.
To delete an Access Rule, select the check box next to the Rule Type, and then click
Delete
.
4.
Click
Cancel
to cancel the configuration on the screen and reset the data on the screen to the
latest value of the switch.
5.
If you make changes to the page, click
Apply
to apply the changes to the system.
Port Authentication
In port-based authentication mode, when 802.1X is enabled globally and on the port, successful
authentication of any one supplicant attached to the port results in all users being able to use the
port without restrictions. At any given time, only one supplicant is allowed to attempt
authentication on a port in this mode. Ports in this mode are under bidirectional control. This is the
default authentication mode.
Table
5-16. Access Rule Configuration Fields
Field
Description
Rule Type
Select Permit to allow access to the switch administrative pages for
traffic that meets the criteria you configure for the rule. Any traffic that
does not meet the rules is denied.
Select Deny to prohibit access to the switch administrative pages for
traffic that meets the criteria you configure for the rule. Any traffic that
does not meet the rules is allowed access to the switch.
Service Type
Select the type of service to allow or prohibit from accessing the switch
management interface:
• SNMP
• HTTP
• HTTPS
Source IP Address
Enter Source IP Address of the client originating the management
traffic. Enter the address in the Source IP address text box.
Mask
Enter the subnet mask associated with the IP address.
Priority
Configure priority to the rule. The rules are validated against the
incoming management request in the ascending order of their priorities.
If a rule matches, action is performed and subsequent rules below are
ignored. For example, if a Source IP 10.10.10.10 is configured with
priority 1 to permit, and Source IP 10.10.10.10 is configured with
priority 2 to Deny, then access is permitted if the profile is active, and
the second rule is ignored.