Defining Port Access Control - Hirschmann MS30, Power MICE, MACH 4000, OCTOPUS User Manual

Industrial ethernet gigabit switch
Hide thumbs Also See for MS30, Power MICE, MACH 4000, OCTOPUS:
Table of Contents

Advertisement

Protection from unauthorized access

6.4.2 Defining port access control

V Select the Security:Port Security dialog.
V First select, whether you wish the MAC based or the IP based port
security.
V If you have selected MAC based you enter in the "Allowed MAC
address" column the MAC address of the device with which a data
exchange at this port is permitted. Without entry, reception from all
devices is allowed.
D
The "Current MAC address" column shows the MAC address of the
device from which data was last received. By pressing the left mouse
button, you can copy an entry from the "Current MAC address"
column into the "Allowed MAC address" column.
V If you selected IP based, enter in the column "Allowed IP addess" the
IP-address of the device, with which data exchange at this port is al-
lowed. Without entry, reception from all devices is allowed.
V In the "Action" column you select whether an unauthorized access at-
tempt should be followed by
– no action (none) or
– the sending of an alarm (trapOnly) or
– switching off the port by making a corresponding entry in the port
configuration table (see
an alarm (trap) (portDisable).
80
"Configuring ports" on page
Layer 2 Enhanced with Layer 2 Professional
6.4 Port access control
67) and sending
Release 1.0 10/05

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rs30, ms20Rs20

Table of Contents