User Manual
Table Of Contents
- Insight Managed 8-Port Gigabit Ethernet Smart Cloud Switch with 2 SFP Fiber Ports
- Contents
- 1. Getting Started
- Switch Management Options and Default Management Mode
- Available Publications
- Web Browser Requirements and Supported Browsers
- User-Defined Fields
- Interface Naming Conventions
- Access the Switch
- Change the Management Mode of the Switch
- Register the Switch
- How to Configure Interface Settings
- Local Browser Interface Device View
- 2. Configure System Information
- View and Configure the Switch Management Settings
- View or Define System Information
- View the Switch CPU Status
- Configure the CPU Thresholds
- Configure the IPv4 Address for the Network Interface and Management VLAN
- Configure the IPv6 Address for the Network Interface
- View the IPv6 Network Neighbor
- Configure the Time Settings
- Configure Denial of Service Settings
- Configure DNS Settings
- Configure Green Ethernet Settings
- Manage the Bonjour Settings and View Bonjour Information
- Control the LEDs
- Use the Device View
- Configure Power over Ethernet
- Configure Link Layer Discovery Protocol
- Configure DHCP L2 Relay and DHCP Snooping
- Set Up PoE Timer Schedules
- View and Configure the Switch Management Settings
- 3. Configure Switching
- 4. Configuring Routing
- 5. Configure Quality of Service
- 6. Manage Device Security
- Management Security Settings
- Configure Management Access
- Configure Port Authentication
- Set Up Traffic Control
- Configure Access Control Lists
- Use the ACL Wizard to Create a Simple ACL
- Configure a Basic MAC ACL
- Configure MAC ACL Rules
- Configure MAC Bindings
- View or Delete MAC ACL Bindings in the MAC Binding Table
- Configure an IP ACL
- Configure Rules for a Basic IP ACL
- Configure Rules for an Extended IP ACL
- Configure an IPv6 ACL
- Configure Rules for an IPv6 ACL
- Configure IP ACL Interface Bindings
- View or Delete IP ACL Bindings in the IP ACL Binding Table
- Configure VLAN ACL Bindings
- 7. Perform Maintenance Tasks
- 8. Manage Power over Ethernet
- 9. Monitor the System
- A. Configuration Examples
- B. Hardware Specifications and Default Values
Manage Device Security
263
Insight Managed 8-Port Gigabit Ethernet Smart Cloud Switch with 2 SFP Fiber Ports
The Access Rule Configuration page displays.
6. From the Rule Type menu, select Permit or Deny to permit or deny access when the
selected rules are matched.
A Permit rule allows access by traffic that matches the rule criteria. A Deny rule blocks
traffic that matches the rule criteria.
7. From the Service Type menu, select the access method to which the rule is applied.
The policy is restricted by the selected access method. The possible access methods are
TFTP, HTTP, and Secure HTTP (SSL).
8. In the Source IP Address field, enter the source IP address of the client originating the
management traffic.
9. In the Mask field, specify the subnet mask of the client that originates the management
traffic.
10. In the Priority field, assign a priority to the rule.
The rules are validated against the incoming management request in ascending order of
their priorities. If a rule matches, the action is performed and subsequent rules are
ignored. For example, if a source IP 10.10.10.10 is configured with priority 1 to permit and
source IP 10.10.10.10 is configured with priority 2 to deny, access is permitted if the
profile is active, and the second rule is ignored.
11. Click the Add button.
The access rule is added.
Configure Port Authentication
With port-based authentication, when 802.1X is enabled globally and on the port, successful
authentication of any one supplicant attached to the port results in all users being able to use
the port without restrictions. At any time, only one supplicant is allowed to attempt
authentication on a port in this mode. Ports in this mode are under bidirectional control. This
is the default authentication mode.
An 802.1X network includes three components:
• Authenticators. The port that is authenticated before system access is permitted.
• Supplicants. The host connected to the authenticated port requesting access to the
system services.
• Authentication Server. The external server, for example, the RADIUS server that
performs the authentication on behalf of the authenticator, and indicates whether the user
is authorized to access system services.