Security Features; Locked Port Support - Dell PowerConnect 5324 User Manual

User's guide
Hide thumbs Also See for PowerConnect 5324:
Table of Contents

Advertisement

Syslog
Syslog is a protocol that allows event notifications to be sent to a set of remote servers, where they
can be stored, examined and acted upon. Multiple mechanisms are implemented to send
notification of significant events in real time, and keep a record of these events for after-the-fact
usage.
For more information on Syslog, see "Managing Logs".
SNTP
The Simple Network Time Protocol (SNTP) assures accurate network device clock time
synchronization up-to the millisecond. Time synchronization is performed by a network SNTP
server. Time sources are established by Stratums. Stratums define the distance from the reference
clock. The higher the stratum (where zero is the highest), the more accurate the clock.
For more information, see "Configuring SNTP Settings".
Traceroute
Traceroute enables discovering IP routes that packets were forwarded along during the forwarding
process. The CLI Traceroute utility can be executed from either the user-exec or privileged modes.

Security Features

SSL
Secure Socket Layer (SSL) is an application-level protocol that enables secure transactions of data
through privacy, authentication, and data integrity. It relies upon certificates and public and private
keys.
Port Based Authentication (802.1x)
Port based authentication enables authenticating system users on a per-port basis via an external
server. Only authenticated and approved system users can transmit and receive data. Ports are
authenticated via the Remote Authentication Dial In User Service (RADIUS) server using the
Extensible Authentication Protocol (EAP).
For more information, see "Configuring Port Based Authentication".

Locked Port Support

Locked Port increases network security by limiting access on a specific port only to users with
specific MAC addresses. These addresses are either manually defined or learned on that port.
When a frame is seen on a locked port, and the frame source MAC address is not tied to that port,
the protection mechanism is invoked.
For more information, see "Configuring Port Security".
26
Introduction

Advertisement

Table of Contents
loading

Table of Contents