System information
Getting Started
General Switch Traffic Security Guideline
General Switch Traffic Security
Guideline
Where the switch is running multiple security options, it implements network
traffic security based on the OSI (Open Systems Interconnection model)
precedence of the individual options, from the lowest to the highest. The
following list shows the order in which the switch implements configured
security features on traffic moving through a given port.
1. Disabled/Enabled physical port
2. MAC lockout (Applies to all ports on the switch.)
3. MAC lockdown
4. Port security
5. Authorized IP Managers
6. Application features at higher levels in the OSI model, such as SSH.
(The above list does not address the mutually exclusive relationship that
exists among some security features.)
Applications for Access Control Lists
(ACLs)
Layer 3 IP filtering with Access Control Lists (ACLs) enables you to improve
network performance and restrict network use by creating policies for:
■ Switch Management Access: Permits or denies in-band management
access. This includes preventing the use of certain TCP or UDP applica-
tions (such as Telnet, SSH, web browser, and SNMP) for transactions
between specific source and destination IP addresses.)
■ Application Access Security: Eliminating unwanted IP, TCP, or UDP
traffic in a path by filtering packets where they enter or leave the switch
on specific VLAN interfaces.
ACLs can filter traffic to or from a host, a group of hosts, or entire subnets.
1-4