Manual
Table Of Contents
- 1. INTRODUTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main WEB PAGE
- 4.2 System
- 4.3 Simple Network Management Protocol
- 4.4 Port Management
- 4.5 Link Aggregation
- 4.6 VLAN
- 4.7 Rapid Spanning Tree Protocol
- 4.8 Quality of Service
- 4.9 Multicast
- 4.10 IEEE 802.1X Network Access Control
- 4.10.1 Understanding IEEE 802.1X Port-Based Authentication
- 4.10.2 802.1X System Configuration
- 4.10.3 802.1X and MAC-Based Authentication Port Configuration
- 4.10.4 802.1X Port Status
- 4.10.5 802.1X and MAC-Based Authentication Statistics
- 4.10.6 Windows Platform RADIUS Server Configuration
- 4.10.7 802.1X Client Configuration
- 4.11 Access Control Lists
- 4.12 Address Table
- 4.13 Port Security (To be Continued)
- 4.14 LLDP
- 4.15 Network Diagnastics
- 4.16 Stacking – SGSW-24040 / SGSW-24040R
- 4.17 Power over Ethernet (SGSW-24040P / SGSW-24040P4)
- 5. COMMAND LINE INTERFACE
- 6. Command Line Mode
- 6.1 System Command
- 6.2 Port Management Command
- 6.3 Link Aggregation Command
- 6.4 VLAN Configuration Command
- 6.5 Spanning Tree Protocol Command
- 6.6 Multicast Configuration Command
- 6.7 Quality of Service Command
- 6.8 802.1x Port Access Control Command
- 6.9 Access Control List Command
- 6.10 MAC Address Table Command
- 6.11 LLDP Command
- 6.12 Stack Management Command
- 6.13 Power over Ethernet Command
- 7. SWITCH OPERATION
- 8. POWER OVER ETHERNET OVERVIEW
- 9. TROUBLE SHOOTING
- APPENDEX A
- APPENDEX B : GLOSSARY

User’s Manual of WGSW-24040 Series
SGSW-24040/24240 Series
172
The page includes the following fields:
Object Description
• Set up Policy Rules
Set up the default policy rules for Client ports, Server ports, Network ports and
Guest ports.
• Set up Port Policies
Group ports into several types according to different ACL policies.
• Set up Typical Network
Application Rules
Set up the specific ACL for different typical network application access control.
• Set up Source MAC
and Source IP Binding
Strictly control the network traffic by only allowing incoming frames that match the
source IP and source MAC on specific port.
• Set up DoS Attack
Detection Rules
Set up the specific ACL to detect DoS attack.
4.11.3.1 Set up Policy Rules
Set up the default policy rules for Client ports, Server ports, Network ports, and Guest ports.
Policy 2 for client ports: Limit the allowed rate of broadcast and multicast frames.
Policy 3 for server ports: Common server access only. (DHCP, FTP, Mail, and WEB server)
Policy 4 for network ports: Limit the allowed rate of TCP SYN flooding and ICMP flooding.
Policy 5 for guest ports: Internet access only.
The screen in Figure 4-11-3 appears.
Figure 4-11-3 Set up Policy Rules page screenshot