Example For Security Configurations; Network Requirements; Configuration Scheme - TP-Link T1600G-18TS Configuration Manual

T1600g series
Hide thumbs Also See for T1600G-18TS:
Table of Contents

Advertisement

Managing MAC Address Table
4

Example for Security Configurations

4.1

Network Requirements

Several departments are connected to the company network as shown in Figure 4-1. Now
the Marketing Department that is in VLAN 10 has network requirements as follows:
 Free the network system from illegal accesses and MAC address attacks by limiting the
number of access users in this department to 100.
 Assist the network manager supervising the network with notifications of any new
access users.
Figure 4-1 The Network Topology
4.2

Configuration Scheme

VLAN Security can be configured to limit the number of access users and in this way to
prevent illegal accesses and MAC address attacks.
MAC Notification and SNMP can be configured to monitor the interface which is used by
the Marketing Department. Enable the new-MAC-learned notification and the SNMP, then
the network manager can get notifications when new users access the network.
Demonstrated with T1600G-52TS, this chapter provides configuration procedures in two
ways: using the GUI and using the CLI.
Gi1/0/2
Switch
Marketing Department
VLAN 10
Example for Security Configurations
Gi1/0/1
Gi1/0/3
......
R&D Department
VLAN 30
Configuration Guide
147

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents