Defining Port Access Control - Hirschmann MACH 4000 User Manual

Industrial ethernet (gigabit) switch
Hide thumbs Also See for MACH 4000:
Table of Contents

Advertisement

Protection from unauthorized access

6.4.2 Defining port access control

Select the Security:Port Security dialog.
First select whether you want MAC-based or IP-based port security.
If you have selected MAC-based security, you enter the MAC ad-
dresses of the devices with which a data exchange at this port is per-
mitted in the "Allowed Mac Address" column. You can enter up to 10
MAC addresses, separated by a space character. If no entry is
made, all devices can receive data.
The "Current MAC Address" column shows the MAC address of the
device from which data was last received. By pressing the left
mouse button, you can copy an entry from the "Current MAC Ad-
dress" column into the "Allowed MAC Address" column.
If you have selected IP-based security, you enter the IP addresses
of the devices with which a data exchange at this port is permitted in
the "Allowed IP Address" column. You can enter up to 10 IP ad-
dresses, separated by a space character. If no entry is made, all de-
vices can receive data.
In the "Action" column you select whether an unauthorized access
bid should be followed by
no action (none) or
the sending of an alarm (trap) (trapOnly) or
the disabling of the port by the corresponding entry in the port
configuration table
the sending of an alarm (trap) (portDisable).
12
(see on page 71 "Configuring the ports")
6.4 Port access control
Basic - L3P
Release 4.0 11/07
and

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Power mice

Table of Contents