03.09.2015 Views

Ethernet switch designed specifically for the utility and industrial markets

Untitled - CacheFly

Untitled - CacheFly

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The SEL-2730M has several essential security features built in.<br />

Simple Network Management Protocol Version 3 (SNMPv3) provides a st<strong>and</strong>ardized method to work with<br />

o<strong>the</strong>r network management systems (NMSs), as well as <strong>the</strong> SEL-5051 Network Management Software. The<br />

SEL-2730M is also compatible with SNMP Version 2 (SNMPv2) to work with o<strong>the</strong>r NMS software.<br />

SNMPv3 provides <strong>the</strong> following security features:<br />

• Message integrity, which ensures a packet has not been tampered with while in transit.<br />

• Au<strong>the</strong>ntication, which determines that <strong>the</strong> message is from a valid source.<br />

• Encryption, which scrambles <strong>the</strong> contents of a packet to prevent it from being seen by an unauthorized<br />

source.<br />

This level of security allows data to be collected securely from SNMP devices without <strong>the</strong> fear of data<br />

tampering or corruption.<br />

And confidential in<strong>for</strong>mation (e.g., SNMP SET comm<strong>and</strong> packets that change router configuration) can be<br />

encrypted to prevent <strong>the</strong> contents from being exposed on <strong>the</strong> network.<br />

Security logging is supported <strong>and</strong> is settable <strong>and</strong> viewable from <strong>the</strong> web interface.<br />

User-based accounts are supported. The interface is just like a Microsoft ® Windows ® login.<br />

Using port-based security, <strong>the</strong> SEL-2730M allows users to create access lists <strong>and</strong> restrict port access to<br />

legitimate stations using one of three methods: Static Lock, Count Lock, or Time Lock mode.<br />

Finally, all rear ports may be turned on or off (activated or deactivated) via <strong>the</strong> web interface to meet<br />

security requirements.<br />

14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!