108
C
HAPTER
11: M
AKING
Y
OUR
N
ETWORK
S
ECURE
You can configure DUD to perform one of the following actions if an
unauthorized client device transmits data on the port:
■
Permanently disable the port
The port is disabled and data from the unauthorized client device is
not transmitted.
■
Temporarily disable the port
The port is disabled for 20 seconds. When the time period has expired
the port is re-enabled; if the port is set to one of the Network Login
security modes, the client device is authenticated again.
■
Do not disable the port
The port is not disabled and data from authorized client devices will
continue to be transmitted, whilst data from unauthorized client
devices will be filtered.
What is Switch
Management
Login?
If you intend to manage the Switch using the Web interface or the
Command Line Interface, you need to log in with a valid user name and
password.
For further information on managing the Switch, see the “Setting Up For
Management” chapter in the Switch 4400 Getting Started Guide.
The user name and password information can be stored in either:
■
a RADIUS server
(recommended)
If you enable RADIUS as the authentication mode of Switch
Management Login, the user name and password information is
stored in a database on a RADIUS server in your network. Subsequent
log in attempts to the Switch are remotely authenticated by the
RADIUS server.
or
■
the local Switch database
(default)
If you enable Local as the authentication mode of Switch
Management Login, the user name and password information is
stored in the local database on the Switch. Subsequent login attempts
to the Switch are authenticated by the local database.
Summary of Contents for 3C17205-US - Corp SUPERSTACK 3 SWITCH 4400...
Page 8: ...GLOSSARY INDEX...
Page 14: ...14...
Page 26: ...26 CHAPTER 1 SWITCH FEATURES OVERVIEW...
Page 44: ...44 CHAPTER 3 USING MULTICAST FILTERING...
Page 55: ...How STP Works 55 Figure 13 STP configurations...
Page 58: ...58 CHAPTER 4 USING RESILIENCE FEATURES...
Page 84: ...84 CHAPTER 7 STATUS MONITORING AND STATISTICS...
Page 92: ...92 CHAPTER 8 SETTING UP VIRTUAL LANS...
Page 98: ...98 CHAPTER 9 USING WEBCACHE SUPPORT...
Page 120: ...120 CHAPTER 12 POWER MANAGEMENT AND CONTROL...
Page 122: ...122...
Page 126: ...126 APPENDIX A CONFIGURATION RULES...
Page 134: ...134 APPENDIX B NETWORK CONFIGURATION EXAMPLES...
Page 150: ...150 GLOSSARY...