beautypg.com

Chapter 22 client security commands, 22 client security commands -1, Client security commands – SMC Networks SMC TigerAccess SMC7824M/FSW User Manual

Page 495: 22 c

background image

22-1

C

HAPTER

22

C

LIENT

S

ECURITY

C

OMMANDS

This switch supports many methods of segregating traffic for clients
attached to each of the data ports, and for ensuring that only authorized
clients gain access to the network. Private VLANs and port-based
authentication using IEEE 802.1X are commonly used for these purposes.
In addition to these methods, several other options of providing client
security are supported by this switch. These include port-based
authentication, which can be configured for network client access
by specifying a fixed set of MAC addresses (either by freezing a set of
dynamically learned entries or through static configuration), or by statically
configured MAC/IP address pairs. The addresses assigned to DHCP
clients can also be carefully controlled using static or dynamic bindings
with the IP Source Guard and DHCP Snooping commands.