Defining Port Access Control - Hirschmann Power MICE User Manual

Basic configuration. industrial ethernet gigabit switch
Hide thumbs Also See for Power MICE:
Table of Contents

Advertisement

Protection from unauthorized access

6.4.2 Defining port access control

V Select the Security:Port Security dialog.
V First select, whether you wish the MAC based or the IP based port
security.
V If you have selected MAC based you enter in the "Allowed MAC
addresses" column the the MAC addresses of the devices with which
a data exchange at this port is permitted. You can enter up to 10 MAC
addresses each ot these seperated with a space character. Without
entry, reception from all devices is allowed.
D
The "Current MAC address" column shows the MAC address of the
device from which data was last received. By pressing the left mouse
button, you can copy an entry from the "Current MAC address"
column into the "Allowed MAC address" column.
V If you selected IP based, enter in the column "Allowed IP addesses"
the IP addresses of the devices, with which data exchange at this
port is allowed. You can enter up to 10 IP addresses each ot these
seperated with a space character. Without entry, reception from all
devices is allowed.
V In the "Action" column you select whether an unauthorized access at-
tempt should be followed by
– no action (none) or
– the sending of an alarm (trapOnly) or
– switching off the port by making a corresponding entry in the port
configuration table (see
an alarm (trap) (portDisable).
Basic - L3P
Release 3.1 06/07
"Configuring ports" on page
6.4 Port access control
69) and sending
85

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mach 4002-24gMach 4002-48gMach 4000

Table of Contents