Cisco Sg3008 Manual
Here you can view all the pages of manual Cisco Sg3008 Manual. The Cisco manuals for Switch are available online for free. You can easily download all the documents as PDF.
Page 471
Security: IPV6 First Hop Security Configuring First Hop Security through Web GUI Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 433 20 Policy Attachment (Port) To attach a policy to one or more ports or LAGs: STEP 1Click Security > First Hop Security > Policy Attachment (Port). The list of policies that are already attached are displayed along with their Interface number, Policy Type, Policy Name and VLAN List. STEP 2To attach a policy to a port...
Page 472
Security: IPV6 First Hop Security Configuring First Hop Security through Web GUI 434 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 20 FHS Status To display the global configuration for the FHS features: STEP 1Click Security > First Hop Security > FHS Status. STEP 2Select a port, LAG or VLAN for which the FHS state is reported. STEP 3The following fields are displayed for the selected interface: •FHS Status -FHS State on Current VL AN:—Is FHS...
Page 473
Security: IPV6 First Hop Security Configuring First Hop Security through Web GUI Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 435 20 -Device Role:—ND Inspection device role. -Drop Unsecure:—Are unsecure messages dropped. -Minimal Securit y Level:—If unsecure messages are not dropped, what is the minimum security level for packets to be forwarded. -Validate Source MAC:—Is source MAC address verification enabled. •DHCP Guard Status -DHCPv6 Guard...
Page 474
Security: IPV6 First Hop Security Configuring First Hop Security through Web GUI 436 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 20 FHS Statistics To display FHS statistics: STEP 1Click Security > First Hop Security > FHS Statistics: STEP 2The following fields are displayed: •NDP (Neighbor Discovery Protocol) Messages—The number of received and bridged messages are displayed for the following types of messages: -RA—Router Advertisement messages...
Page 475
Security: IPV6 First Hop Security Configuring First Hop Security through Web GUI Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 437 20
Page 476
21 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 438 Security: Secure Sensitive Data Management Secure Sensitive Data (SSD) is an architecture that facilitates the protection of sensitive data on a device, such as passwords and keys. The facility makes use of passphrases, encryption, access control, and user authentication to provide a secure solution to managing sensitive data. The facility is extended to protect the integrity of configuration...
Page 477
Security: Secure Sensitive Data Management SSD Rules Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 439 21 SSD grants read permission to sensitive data only to authenticated and authorized users, and according to SSD rules. A device authenticates and authorizes management access to users through the user authentication process. Whether or not SSD is used, it is recommended that the administrator secure the authentication process by using the...
Page 478
Security: Secure Sensitive Data Management SSD Rules 440 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 21 NOTEA device may not support all the channels defined by SSD. Elements of an SSD Rule An SSD rule includes the following elements: •User type—The user types supported in order of most preference to least preference are as follows: (If a user matches multiple SSD rules, the rule with the most preference User Type will be applied). -Specific—The...
Page 479
Security: Secure Sensitive Data Management SSD Rules Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 441 21 -(Higher) Plaintext Only—Users are permitted to access sensitive data in plaintext only. Users will also have read and write permission to SSD parameters as well. -(Highest) Both—Users have both encrypted and plaintext permissions and are permitted to access sensitive data as encrypted and in plaintext. Users will also have read and write...
Page 480
Security: Secure Sensitive Data Management SSD Rules 442 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 21 NOTENote the following: •The default Read mode for the Secure XML SNMP and Insecure XML SNMP management channels must be identical to their read permission. •Read permission Exclude is allowed only for Secure XML SNMP and Insecure XML SNMP management channels; Exclude is not allowed for regular secure and insecure channels. •Exclude sensitive...