64 CHAPTER 3: MANAGING DEVICE SECURITY
■ Enable Traps — Indicates if traps are enabled for multiple Hosts. The
possible field values are:
■ Checked — Indicates that traps are enabled for multiple hosts.
■ Unchecked — Indicates that traps are disabled for multiple hosts.
■ Trap Frequency — Defines the time period by which traps are sent to
the host. The Trap Frequency (1-1000000) field can be defined only if
multiple hosts are disabled. The default is 10 seconds.
2 Define the fields.
3 Click . The Multiple Host Authentication fields are modified, and
the device is updated.
Managing Port
Security
Network security can be increased by limiting access on a specific port
only to users with specific MAC addresses. The MAC addresses can be
dynamically learned or statically configured. Locked port security
monitors both received and learned packets that are received on specific
ports. Access to the locked port is limited to users with specific MAC
addresses. These addresses are either manually defined on the port, or
learned on that port up to the point when it is locked. When a packet is
received on a locked port, and the packet source MAC address is not tied
to that port (either it was learned on a different port, or it is unknown to
the system), the protection mechanism is invoked, and can provide
various options. Unauthorized packets arriving at a locked port are either:
■ Forwarded
■ Discarded with no trap
■ Discarded with a trap
■ Shuts down the port.
Locked port security also enables storing a list of MAC addresses in the
configuration file. The MAC address list can be restored after the device
has been reset.