Security Tools¶
The CISCO / BushNET Serial Manager includes a suite of security management tools for configuring ACLs, 802.1X authentication, and port security on the IE3300 switch.
Overview¶
| Tool | Purpose |
|---|---|
| ACL Editor | Visual builder for standard and extended Access Control Lists |
| 802.1X Dialog | Port-based authentication configuration with RADIUS |
| Port Security | MAC-based port security with sticky learning and violation handling |
Access these tools from the Security menu in the main application window.
ACL Editor¶
The ACL Editor provides a visual interface for creating and managing Access Control Lists without needing to remember complex CLI syntax.
ACL Types¶
| Type | Description | Use Case |
|---|---|---|
| Standard ACL | Filters by source IP address only | Simple traffic filtering |
| Extended ACL | Filters by source/destination IP, protocol, and ports | Detailed traffic control |
Creating an ACL¶
- Open Security → ACL Editor
- Click Create ACL
- Enter the ACL name or number
- Select the ACL type (Standard or Extended)
Adding ACL Entries (ACEs)¶
Each ACE defines a permit or deny rule:
- Click Add Entry
- Configure the entry:
| Field | Description |
|---|---|
| Sequence | Order of evaluation (lower numbers evaluated first) |
| Action | permit or deny |
| Protocol | IP, TCP, UDP, ICMP, etc. (extended ACL only) |
| Source Address | Source IP address |
| Source Wildcard | Source wildcard mask |
| Destination Address | Destination IP address (extended ACL only) |
| Destination Wildcard | Destination wildcard mask (extended ACL only) |
| Source Port | Source port operator and value (extended ACL only) |
| Destination Port | Destination port operator and value (extended ACL only) |
| Log | Enable logging of matched packets |
Managing Entries¶
- Edit — Modify an existing ACE
- Delete — Remove an ACE
- Move Up/Down — Reorder ACEs (evaluation order matters)
Applying an ACL to an Interface¶
- Select the target interface from the dropdown
- Choose the direction: Inbound or Outbound
- Click Apply to Interface
Config Preview¶
Click Generate Config to preview the Cisco IOS commands before applying:
ip access-list extended BLOCK_TELNET
10 deny tcp any any eq 23 log
20 permit ip any any
!
interface GigabitEthernet1/1
ip access-group BLOCK_TELNET in
802.1X Authentication¶
The 802.1X dialog provides port-based network access control using IEEE 802.1X authentication.
Overview¶
802.1X authenticates devices connecting to switch ports using a RADIUS server. Unauthenticated devices are denied network access until they provide valid credentials.
Global Configuration¶
- Open Security → 802.1X Configuration
- Click Enable Global to enable 802.1X system-wide
- Configure the RADIUS server IP address
Per-Port Configuration¶
Select a port from the port status table to configure its 802.1X settings:
| Setting | Options | Description |
|---|---|---|
| Auth Method | auto / force-authorized / force-unauthorized | Port authentication mode |
| Host Mode | single-host / multi-host / multi-domain / multi-auth | How many devices allowed |
| Reauth Period | 1-65535 seconds | Time between re-authentication attempts |
Authentication Methods¶
| Method | Description |
|---|---|
| auto | Port authenticates using 802.1X; unauthenticated devices are blocked |
| force-authorized | Port is always authorized (no authentication required) |
| force-unauthorized | Port is always unauthorized (no traffic allowed) |
Host Modes¶
| Mode | Description |
|---|---|
| single-host | Only one device allowed per port |
| multi-host | Multiple devices allowed after first authenticates |
| multi-domain | One device per domain (data + voice) |
| multi-auth | Each device must authenticate individually |
Port Status Table¶
The table shows the current 802.1X status of each port:
- Interface — Port name
- Auth State — Authorized / Unauthorized
- Method — Current authentication method
- Supplicant MAC — Authenticated device MAC address
- Assigned VLAN — VLAN assigned by RADIUS (if applicable)
Viewing Statistics¶
Click Show Statistics to view 802.1X authentication statistics including successful and failed authentication attempts.
Port Security¶
The Port Security dialog allows you to control which devices can connect to each switch port based on MAC addresses.
Overview¶
Port security limits the number of MAC addresses learned on a port and defines what happens when a violation occurs (e.g., an unauthorised device connects).
Configuring Port Security¶
- Open Security → Port Security
- Select a port from the port security table
- Configure:
| Setting | Description |
|---|---|
| Enable | Turn port security on/off |
| Maximum MACs | Maximum number of allowed MAC addresses (1-132) |
| Violation Mode | Action when a violation occurs |
| Sticky MAC | Dynamically learn and persist MAC addresses |
Violation Modes¶
| Mode | Description |
|---|---|
| protect | Drops traffic from unauthorised MACs silently |
| restrict | Drops traffic and sends an SNMP trap/syslog message |
| shutdown | Puts the port in error-disabled state |
Sticky MAC Addresses¶
When enabled, the switch dynamically learns MAC addresses and adds them to the running configuration. This means:
- Devices are automatically authorised on first connection
- Learned MACs persist across reboots (after
write memory) - No manual MAC address entry required
Clearing Violations¶
If a port enters error-disabled state due to a security violation:
- Select the affected port
- Click Clear Violation to bounce the port (shutdown/no shutdown)
Alternatively, configure auto-recovery:
Viewing Secure MACs¶
Click Show MACs to display all MAC addresses learned on the selected port, including:
- Sticky MACs — Dynamically learned and persisted
- Static MACs — Manually configured
- Dynamic MACs — Currently learned (not persisted)
Port Security Status Table¶
The main table shows the security status of all ports:
| Column | Description |
|---|---|
| Interface | Port name |
| Enabled | Whether port security is active |
| Max MACs | Maximum allowed MAC addresses |
| Current MACs | Number of MACs currently learned |
| Violation Mode | protect / restrict / shutdown |
| Status | Secure / Violation / Error-disabled |