EasyManua.ls Logo

Hirschmann MACH 4000 User Manual

Hirschmann MACH 4000
240 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #97 background imageLoading...
Page #97 background image
Protection from unauthorized access
Basic - L3P
Release
4.0
11/07
6.6
Access Control Lists (ACL).
23
6.6.5 Configuring MAC ACLs
Example: MAC ACL
Filtering AppleTalk and IPX from the entire network.
enable Switch to the Priviledged EXEC mode.
configure Switch to the Configuration mode.
mac access-list extended
ipx-apple
deny any any ipx
deny any any appletalk
permit any any
Create the extended ACL "ipx-apple".
Add the rule "deny IPX" to the list.
Add the rule "deny AppleTalk" to the list.
Add the rule "permit all other data" to the list.
exit Switch to the Configuration mode.
mac access-group ipx-apple
in
Attach the ACL "ipx-apple" to all interfaces.
exit Switch to the Priviledged EXEC mode.
show mac access-lists Display the ACLs.
MAC ACL Name Rules Direction Interface(s)
------------------------------- ----- --------- ------------------
ipx-apple 3 inbound 1/1,1/2,1/3,1/4,2/
1,2/2,2/3,2/4,3/1,3/2
show access-lists interface
1/1 in
Display the ACLs of interface 1.1.
ACL Type ACL ID Sequence Number
-------- ------------------------------- ---------------
MAC ipx-apple 1

Table of Contents

Other manuals for Hirschmann MACH 4000

Question and Answer IconNeed help?

Do you have a question about the Hirschmann MACH 4000 and is the answer not in the manual?

Hirschmann MACH 4000 Specifications

General IconGeneral
ModelMACH4000
Operating Temperature-40°C to +70°C
ManagedYes
Switching TechnologyStore-and-forward
ManagementWeb-based, CLI, SNMP
PortsUp to 24
Port Type and Speed10/100/1000 Mbps Ethernet, Gigabit Ethernet
Speed10/100/1000 Mbps
VLAN SupportYes
RedundancyHSR, PRP

Summary

Access to the User Interfaces

1.2 Command Line Interface

Use the CLI for detailed configuration and advanced switch management.

1.3 Web-based Interface

Configure the switch graphically via a web browser interface.

Entering the IP Parameters

2.2 Entering IP parameters via CLI

Configure IP settings using the Command Line Interface.

2.6 System configuration via DHCP

Automate IP parameter assignment using DHCP.

2.8 System configuration via the Web-based interface

Set IP parameters through the graphical web interface.

2.9 Faulty device replacement

Solutions for replacing a faulty switch with a new one.

Loading/saving settings

3.1 Loading settings

Methods for loading configuration data into the switch.

3.2 Saving settings

Methods for saving current configuration data.

Loading software updates

Configuring the ports

Protection from unauthorized access

6.2 Telnet/Web/SSH access

Manage and secure remote access protocols like Telnet, Web, and SSH.

6.4 Port access control

Implement MAC or IP-based security policies on switch ports.

6.5 Port authentication according to 802.1X

Secure network access using IEEE 802.1X port authentication.

6.6 Access Control Lists (ACL).

Filter traffic based on IP or MAC addresses using Access Control Lists.

Network load control

8.3 Rate Limiter

Control traffic rates on ports to prevent congestion.

8.4 QoS/Priority

Prioritize traffic types to ensure quality for critical applications.

8.6 VLANs

Segment the network into virtual LANs for better organization.

Operation diagnosis

9.2 Monitoring the device status

Check the overall operational status and health of the switch.

9.9 Detecting IP address conflicts

Detect and resolve IP address conflicts on the network.

Setting up configuration environment

A.4 Preparing access via SSH

Set up SSH access using key pairs for secure remote management.

Related product manuals