User Manual
Table Of Contents
- Insight Managed 8-Port Gigabit Ethernet Smart Cloud Switch with 2 SFP Fiber Ports
- Contents
- 1. Getting Started
- Switch Management Options and Default Management Mode
- Available Publications
- Web Browser Requirements and Supported Browsers
- User-Defined Fields
- Interface Naming Conventions
- Access the Switch
- Change the Management Mode of the Switch
- Register the Switch
- How to Configure Interface Settings
- Local Browser Interface Device View
- 2. Configure System Information
- View and Configure the Switch Management Settings
- View or Define System Information
- View the Switch CPU Status
- Configure the CPU Thresholds
- Configure the IPv4 Address for the Network Interface and Management VLAN
- Configure the IPv6 Address for the Network Interface
- View the IPv6 Network Neighbor
- Configure the Time Settings
- Configure Denial of Service Settings
- Configure DNS Settings
- Configure Green Ethernet Settings
- Manage the Bonjour Settings and View Bonjour Information
- Control the LEDs
- Use the Device View
- Configure Power over Ethernet
- Configure Link Layer Discovery Protocol
- Configure DHCP L2 Relay and DHCP Snooping
- Set Up PoE Timer Schedules
- View and Configure the Switch Management Settings
- 3. Configure Switching
- 4. Configuring Routing
- 5. Configure Quality of Service
- 6. Manage Device Security
- Management Security Settings
- Configure Management Access
- Configure Port Authentication
- Set Up Traffic Control
- Configure Access Control Lists
- Use the ACL Wizard to Create a Simple ACL
- Configure a Basic MAC ACL
- Configure MAC ACL Rules
- Configure MAC Bindings
- View or Delete MAC ACL Bindings in the MAC Binding Table
- Configure an IP ACL
- Configure Rules for a Basic IP ACL
- Configure Rules for an Extended IP ACL
- Configure an IPv6 ACL
- Configure Rules for an IPv6 ACL
- Configure IP ACL Interface Bindings
- View or Delete IP ACL Bindings in the IP ACL Binding Table
- Configure VLAN ACL Bindings
- 7. Perform Maintenance Tasks
- 8. Manage Power over Ethernet
- 9. Monitor the System
- A. Configuration Examples
- B. Hardware Specifications and Default Values
Manage Device Security
277
Insight Managed 8-Port Gigabit Ethernet Smart Cloud Switch with 2 SFP Fiber Ports
If you do not know the IP address of the switch, see Access the Switch on page 13.
The login window opens.
4. Enter the switch’s password in the password field.
The default password is password. If you added the switch to a network on the Insight
app before and you did not yet change the password through the local browser interface,
enter your Insight network password.
The System Information page displays.
5. Select Security > Traffic Control > Port Security > Port Security Configuration.
The Port Security Configuration page displays.
6. To enable port security on the switch, select the Port Security Mode Enable radio button.
The default is Disable.
7. Click the Apply button.
Your settings are saved.
8. To refresh the page with the latest information about the switch, click the Refresh button.
The Port Security Violations table shows information about violations that occurred on ports
that are enabled for port security.
The following table describes the fields in the Port Security Violations table.
Configure a Port Security Interface
A MAC address can be defined as allowable by one of two methods: dynamically or statically.
Both methods are used concurrently when a port is locked.
Dynamic locking implements a first arrival mechanism for port security. You specify how
many addresses can be learned on the locked port. If the limit was not reached, then a
packet with an unknown source MAC address is learned and forwarded normally. When the
limit is reached, no more addresses are learned on the port. Any packets with source MAC
addresses that were not already learned are discarded. You can effectively disable dynamic
locking by setting the number of allowable dynamic entries to zero.
Static locking allows you to specify a list of MAC addresses that are allowed on a port. The
behavior of packets is the same as for dynamic locking: only packets with an allowable
source MAC address can be forwarded.
Table 74. Port Security Violations information
Field Description
Port The physical interface.
Last Violation MAC The source MAC address of the last packet that was discarded at a locked port.
VLAN ID The VLAN ID corresponding to the last MAC address violation.