EasyManua.ls Logo

Black Box LEV2525A - Page 8

Black Box LEV2525A
143 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
MNS-BB Software User Guide
-VI-
5.7.3 Zone and Daylight Time Rule............................................................................................................... 22
5.8 CLI: Configuration commands......................................................................................................................22
5.8.1 To save the configuration......................................................................................................................22
5.8.2 To load or restore the configuration......................................................................................................22
5.8.3 To erase the current configuration ........................................................................................................ 23
5.8.4 Summary (Steps)...................................................................................................................................23
5.9 Web: Configuring IP Addressing...................................................................................................................23
5.10 How IP Addressing Affects Switch Operation ..............................................................................................23
6.0 SECURITY FEATURES.................................................................................................................................24
6.1 Manager and Operator passwords:.................................................................................................................24
6.2 Console access interface and the CLI............................................................................................................24
6.2.1 Manager................................................................................................................................................24
6.2.2 Operator................................................................................................................................................ 24
6.3 To use password security:..............................................................................................................................24
6.4 CLI: Setting Manager and Operator Passwords.............................................................................................24
6.4.1 Configuring Manager and Operator Passwords ....................................................................................24
6.5 Access Levels................................................................................................................................................24
6.6 Configuring and Monitoring Port Security....................................................................................................24
6.6.1 Basic Operation.....................................................................................................................................25
6.6.2 Blocking Unauthorized Traffic.............................................................................................................25
6.6.3 Planning For Port Security....................................................................................................................25
6.7 CLI: Port Security Command Options and Operation ................................................................................... 25
6.8 Reading Intrusion Alerts and Resetting Alert Flags ......................................................................................27
6.8.1 Notice of Security Violations................................................................................................................27
6.8.2 How the Intrusion Log Operates...........................................................................................................27
6.9 Web: Viewing and Configuring Port Security...............................................................................................28
6.10 SSL (Secure Sockets Layer).......................................................................................................................... 28
6.10.1 The SSL Protocol.................................................................................................................................. 28
6.10.2 Ciphers Used with SSL.........................................................................................................................30
6.10.3 CLI........................................................................................................................................................30
7.0 USING AUTHORIZED IP MANAGERS TO PROTECT AGAINST UNAUTHORIZED ACCESS......32
7.1 Authorized IP Manager Features................................................................................................................... 32
7.2 Access Levels................................................................................................................................................32
7.2.1 Authorizing Single Stations:.................................................................................................................32
7.2.2 Authorizing Multiple Stations:..............................................................................................................32
7.3 Overview of IP Mask Operation....................................................................................................................32
7.4 CLI: Viewing and Configuring Authorized IP Managers..............................................................................33
7.5 Building IP Masks .........................................................................................................................................33
7.5.1 Configuring One Station Per Authorized Manager IP Entry.................................................................34
7.5.2 Configuring Multiple Stations Per Authorized Manager IP.................................................................. 34
7.6 Operating and Troubleshooting Notes:..........................................................................................................35
7.6.1 Network Security Precautions:..............................................................................................................35
7.6.2 Duplicate IP Addresses:........................................................................................................................35
7.6.3 Web Proxy Servers: ..............................................................................................................................35
7.6.4 Global Access.......................................................................................................................................35
7.7 Web: Viewing and Configuring Global Access Information.........................................................................35
7.7.1 Web: Viewing and Configuring System Information ........................................................................... 35
8.0 SNMP: CONFIGURATION FOR NETWORK MANAGEMENT APPLICATIONS ..............................36
8.1 Overview .......................................................................................................................................................36
8.2 SNMP v1, v2 and v3...................................................................................................................................... 36
8.3 BitView and HubView ..................................................................................................................................36
8.4 SNMP Management Features ........................................................................................................................ 37
8.5 Configuring for SNMP Access to the Switch ................................................................................................ 37
8.6 CLI: Viewing and Configuring Community Names......................................................................................38
8.6.1 Listing Community Names...................................................................................................................38
8.7 Configuring Community Names and Values.................................................................................................38
8.7.1 Adding SNMP Communities in the Switch ..........................................................................................38
8.7.2 Adding SNMP Traps in the Switch.......................................................................................................38
8.7.3 Add or Modify system parameters........................................................................................................38
8.8 Using the CLI To List Current SNMP Trap Receivers..................................................................................39
8.9 SNMP version 3 (SNMPv3) ..........................................................................................................................39
8.9.1 Benefits................................................................................................................................................. 40
8.9.2 List of Terms.........................................................................................................................................40
8.9.3 Supported MIBs and RFCs ...................................................................................................................41
8.9.4 CLI........................................................................................................................................................42

Table of Contents

Related product manuals