MNS-BB Software User Guide
-VI-
5.7.3 Zone and Daylight Time Rule............................................................................................................... 22
5.8 CLI: Configuration commands......................................................................................................................22
5.8.1 To save the configuration......................................................................................................................22
5.8.2 To load or restore the configuration......................................................................................................22
5.8.3 To erase the current configuration ........................................................................................................ 23
5.8.4 Summary (Steps)...................................................................................................................................23
5.9 Web: Configuring IP Addressing...................................................................................................................23
5.10 How IP Addressing Affects Switch Operation ..............................................................................................23
6.0 SECURITY FEATURES.................................................................................................................................24
6.1 Manager and Operator passwords:.................................................................................................................24
6.2 Console access interface and the CLI............................................................................................................24
6.2.1 Manager................................................................................................................................................24
6.2.2 Operator................................................................................................................................................ 24
6.3 To use password security:..............................................................................................................................24
6.4 CLI: Setting Manager and Operator Passwords.............................................................................................24
6.4.1 Configuring Manager and Operator Passwords ....................................................................................24
6.5 Access Levels................................................................................................................................................24
6.6 Configuring and Monitoring Port Security....................................................................................................24
6.6.1 Basic Operation.....................................................................................................................................25
6.6.2 Blocking Unauthorized Traffic.............................................................................................................25
6.6.3 Planning For Port Security....................................................................................................................25
6.7 CLI: Port Security Command Options and Operation ................................................................................... 25
6.8 Reading Intrusion Alerts and Resetting Alert Flags ......................................................................................27
6.8.1 Notice of Security Violations................................................................................................................27
6.8.2 How the Intrusion Log Operates...........................................................................................................27
6.9 Web: Viewing and Configuring Port Security...............................................................................................28
6.10 SSL (Secure Sockets Layer).......................................................................................................................... 28
6.10.1 The SSL Protocol.................................................................................................................................. 28
6.10.2 Ciphers Used with SSL.........................................................................................................................30
6.10.3 CLI........................................................................................................................................................30
7.0 USING AUTHORIZED IP MANAGERS TO PROTECT AGAINST UNAUTHORIZED ACCESS......32
7.1 Authorized IP Manager Features................................................................................................................... 32
7.2 Access Levels................................................................................................................................................32
7.2.1 Authorizing Single Stations:.................................................................................................................32
7.2.2 Authorizing Multiple Stations:..............................................................................................................32
7.3 Overview of IP Mask Operation....................................................................................................................32
7.4 CLI: Viewing and Configuring Authorized IP Managers..............................................................................33
7.5 Building IP Masks .........................................................................................................................................33
7.5.1 Configuring One Station Per Authorized Manager IP Entry.................................................................34
7.5.2 Configuring Multiple Stations Per Authorized Manager IP.................................................................. 34
7.6 Operating and Troubleshooting Notes:..........................................................................................................35
7.6.1 Network Security Precautions:..............................................................................................................35
7.6.2 Duplicate IP Addresses:........................................................................................................................35
7.6.3 Web Proxy Servers: ..............................................................................................................................35
7.6.4 Global Access.......................................................................................................................................35
7.7 Web: Viewing and Configuring Global Access Information.........................................................................35
7.7.1 Web: Viewing and Configuring System Information ........................................................................... 35
8.0 SNMP: CONFIGURATION FOR NETWORK MANAGEMENT APPLICATIONS ..............................36
8.1 Overview .......................................................................................................................................................36
8.2 SNMP v1, v2 and v3...................................................................................................................................... 36
8.3 BitView and HubView ..................................................................................................................................36
8.4 SNMP Management Features ........................................................................................................................ 37
8.5 Configuring for SNMP Access to the Switch ................................................................................................ 37
8.6 CLI: Viewing and Configuring Community Names......................................................................................38
8.6.1 Listing Community Names...................................................................................................................38
8.7 Configuring Community Names and Values.................................................................................................38
8.7.1 Adding SNMP Communities in the Switch ..........................................................................................38
8.7.2 Adding SNMP Traps in the Switch.......................................................................................................38
8.7.3 Add or Modify system parameters........................................................................................................38
8.8 Using the CLI To List Current SNMP Trap Receivers..................................................................................39
8.9 SNMP version 3 (SNMPv3) ..........................................................................................................................39
8.9.1 Benefits................................................................................................................................................. 40
8.9.2 List of Terms.........................................................................................................................................40
8.9.3 Supported MIBs and RFCs ...................................................................................................................41
8.9.4 CLI........................................................................................................................................................42