User Documentation

Planning
2053260000/05/2015
49
2.13.2 Security
Port security
Port security ensures that an unused port is not accessed without authorisation.
This is done, e.g., by software-controlled deactivation of the port. It must be
possible to undo the port deactivation when the port is used again.
Ports
Each network component is assigned a unique IP address which is used to
address this component directly. Ports enable the individual addressing of various
applications using this IP address.
If you wish to address an FTP server with the IP address 192.168.100.125, enter
this address followed by a colon (:) and the port number 21.
Example: 192.168.100.125:21
This way, you can address a network component directly and reach the requested
application via the port.
The ports
0 to 1023 are reserved for specic services such as FTP (21), SMTP (25),
HTTP (80), Pop3 (110) etc.,
1024 to 49151 are registered ports for specic applications,
49152 to 65535 are private ports that anyone may use .
Trunking for higher bandwidth
Multiple physical fast Ethernet connections between two devices are summarised
to a logical totality (virtual trunk) of the connection. This way, it is possible to
transfer Fast Ethernet (100 Mbps) to Gigabit Ethernet (1,000 Mbps).