Page 71 / 104 Scroll up to view Page 66 - 70
63
Chapter 5: Configuring the Switch through the Web Utility
Security
24-Port 10/100 + 2-Port Gigabit Switch with Webview and Power over Ethernet
Port Security
Port security is a feature that allows you to configure a switch port with one or more device MAC addresses that
are authorized to access the network through that port. When port security is enabled on a port, the switch stops
learning new MAC addresses on the specified port when it has reached a configured maximum number. Only
incoming traffic with source addresses already stored in the dynamic or static address table will be accepted as
authorized to access the network through that port. If a device with an unauthorized MAC address attempts to
use the switch port, the intrusion will be detected and the switch can automatically take action by disabling the
port and sending a trap message.
To use port security, specify a maximum number of addresses to allow on the port and then let the switch
dynamically learn the <source MAC address, VLAN> pair for frames received on the port. When the port has
reached the maximum number of MAC addresses the selected port will stop learning. The MAC addresses
already in the address table will be retained and will not age out. Any other device that attempts to use the port
will be prevented from accessing the switch.
Set the action to take when an invalid address is detected on a port, mark the checkbox in the Status column to
enable security for a port, set the maximum number of MAC addresses allowed on a port.
Click
Submit
to save the changes.
Storm Control
You can protect your network from broadcast storms by setting a threshold for broadcast traffic for all ports. Any
broadcast packets exceeding the specified threshold will then be dropped.
Set the threshold using the Threshold text field, to enable storm control on a specified port mark the Enable
checkbox for that port. storm control on a specified port.
Click
Submit
to save the changes.
Figure 5-47: Security - Port Security
Figure 5-48: Security - Storm Control
Page 72 / 104
64
Chapter 5: Configuring the Switch through the Web Utility
Security
24-Port 10/100 + 2-Port Gigabit Switch with Webview and Power over Ethernet
HTTPS Settings
You can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Socket
Layer (SSL), providing secure access (that is, an encrypted connection) to the switch’s web interface.
Mark the HTTPS Status checkbox to enable HTTPS and specify the port number.
Click
Submit
to save the changes.
System Password
The switch supports up to 16 user names and passwords for management access (console and web interfaces).
Each user account has an associated access level; either Normal or Privileged. A Normal level user has only read
access for most configuration parameters. However, a Privileged user has write access for all parameters
governing the switch. The default Normal user name is “guest” with the password "guest." The default
Privileged user name is “admin” with no password. You should therefore assign a new password for the "admin"
user account or create new Privileged user accounts, and store them in a safe place. Both the default "admin"
and "guest" user accounts can be deleted from the system.
To configure a new user account, enter the user name, access level, and password - up to eight characters long
- and click
Add
. To change the password for a specific user, enter the user name and new password, confirm the
password by entering it again. Up to 16 user accounts can be configured on this switch.
Click
Change
to save the changes.
Figure 5-49: Security - HTTPS Settings
Figure 5-50: Security - System Password
Page 73 / 104
65
Chapter 5: Configuring the Switch through the Web Utility
SNTP
24-Port 10/100 + 2-Port Gigabit Switch with Webview and Power over Ethernet
SNTP
The SNTP tab includes links to the Global Settings screen.
Global Settings
Simple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic updates from a
time server (SNTP or NTP). Maintaining an accurate time on the switch enables the system log to record
meaningful dates and times for event entries.
To receive updates the switch sends unicast packets to the SNTP server.
Set the Polling Interval using the text field provided. Set the IP address of up to three SNTP servers using the text
fields provided.
Click
Submit
to save the changes.
Figure 5-51: SNTP - Global Settings
Page 74 / 104
66
Chapter 5: Configuring the Switch through the Web Utility
Statistics
24-Port 10/100 + 2-Port Gigabit Switch with Webview and Power over Ethernet
Statistics
You can display standard statistics on network traffic from the Interfaces Group and Ethernet-like MIBs, as well
as a detailed breakdown of traffic based on the RMON MIB. Interfaces and Ethernet-like statistics display errors
on the traffic passing through each port.
The Statistics tab includes links to the following screens.
Interface Statistics
Etherlike Statistics
RMON Statistics
Interface Statistics
To view the interface statistics for a port or lag, select the required interface from the drop-down menu and click
Refresh
.
Figure 5-52: Statistics - Interface Statistics
Page 75 / 104
67
Chapter 5: Configuring the Switch through the Web Utility
Statistics
24-Port 10/100 + 2-Port Gigabit Switch with Webview and Power over Ethernet
Etherlike Statistics
To view the Etherlike statistics for a port or lag, select the required interface from the drop-down menu and click
Refresh
.
RMON Statistics
To view the RMON statistics for a port or lag, select the required interface from the drop-down menu and click
Refresh
.
Figure 5-53: Statistics - Etherlike Statistics
Figure 5-54: Statistics - RMON Statistics

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top