Hirschmann RS20 User Manual page 90

Industrial
Hide thumbs Also See for RS20:
Table of Contents

Advertisement

Protection from Unauthorized Access
6.5.3
Description of the Port Access Control
You can configure the device in such a way that it helps to protect every port
from unauthorized access. Depending on your selection, the device checks
the MAC address or the IP address of the connected device.
The following functions are available for monitoring every individual port:
The device can distinguish between authorized and unauthorized access
and supports two types of access control:
Access for all:
– no access restriction.
– MAC address 00:00:00:00:00:00 or
– IP address 0.0.0.0.
Access exclusively for defined MAC and IP addresses:
– only devices with defined MAC or IP addresses have access.
– You can define up to 10 IP addresses, MAC addresses or maskable
MAC addresses.
The device can react to an unauthorized access attempt in 3 selectable
ways:
none: no response
trapOnly: message by sending a trap
portDisable: message by sending a trap and disabling the port
6.5.4
Application Example for Port Access Control
You have a LAN connection in a room that is accessible to everyone. To set
the device so that only defined users can use the LAN connection, activate
the port access control on this port. An unauthorized access attempt will
cause the device to shut down the port and alert you with an alarm message.
The following is known:
90
6.5 HiDiscovery Access
Basic Configuration
Release 6.0 07/2010

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents