Manage Device Security
299
Insight Managed 28-Port Gigabit Ethernet Smart Cloud Switch with 2 SFP 1G & 2 SFP+ 10G Fiber Ports
The default password is password. If you added the switch to a network on the Insight
app before and you did not yet change the password through the local browser interface,
enter your Insight network password.
The System Information page displays.
5. Select Security > Traffic Control > Private VLAN > Private Vlan Promiscuous Interface
Configuration.
The Private VLAN Promiscuous Interface Configuration page displays.
6. To display information for all ports and LAGs, click the All link.
7. Select one or more interfaces by taking one of the following actions:
• To configure a single interface, select the check box associated with the port, or type
the port number in the Go To Interface field and click the Go button.
• To configure multiple interfaces with the same settings, select the check box
associated with each interface.
• To configure all interfaces with the same settings, select the check box in the heading
row.
8. In the Promiscuous Primary VLAN field, enter the primary VLAN ID for the promiscuous
association mode.
The range of the VLAN ID is 2–4093.
9. In the Promiscuous Secondary VLAN(s) field, enter the secondary VLAN ID for
promiscuous association mode.
This field can accept single a VLAN ID, a range of VLAN IDs, or a combination of both in
sequence separated by a comma. You can specify an individual VLAN ID, such as 10.
You can specify the VLAN range values separated by a hyphen, for example, 10-13. You
can specify the combination of both separated by commas, for example,
12,15,40-43,1000-1005, 2000. The range of VLAN IDs is 2–4093.
Note: The VLAN ID list that you specify replaces the configured secondary
VLAN list in the association.
10. Click the Apply button.
Your settings are saved.
The Operational VLAN(s) field displays the operational VLANs.
Configure Access Control Lists
Access control lists (ACLs) ensure that only authorized users can access specific resources
while blocking off any unwarranted attempts to reach network resources. ACLs are used to
provide traffic flow control, restrict contents of routing updates, decide which types of traffic
are forwarded or blocked, and above all provide security for the network. The switch’s
software supports IPv4, IPv6, and MAC ACLs.