EasyManuals Logo

Cisco SG350-10MP Administration Guide

Cisco SG350-10MP
762 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #496 background imageLoading...
Page #496 background image
Security
Port Security
Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4 353
17
Port Security
NOTE Port security cannot be enabled on ports on which 802.1X is enabled or on ports that defined
as SPAN destination
.
Network security can be increased by limiting access on a port to users with specific MAC
addresses. The MAC addresses can be either dynamically learned or statically configured.
Port security monitors received and learned packets. Access to locked ports is limited to users
with specific MAC addresses.
Port Security has four modes:
Classic Lock—All learned MAC addresses on the port are locked, and the port does
not learn any new MAC addresses. The learned addresses are not subject to aging or
re-learning.
Limited Dynamic Lock—The device learns MAC addresses up to the configured
limit of allowed addresses. After the limit is reached, the device does not learn
additional addresses. In this mode, the addresses are subject to aging and re-learning.
Secure Permanent—Keeps the current dynamic MAC addresses associated with the
port (as long as the configuration was saved to the Start configuration file). New MAC
addresses can be learned as Permanent Secure ones up to the maximum addresses
allowed on the port. Relearning and aging are disabled.
Secure Delete on Reset—Deletes the current dynamic MAC addresses associated with
the port after reset. New MAC addresses can be learned as Delete-On-Reset ones up to
the maximum addresses allowed on the port. Relearning and aging are disabled.
When a frame from a new MAC address is detected on a port where it is not authorized (the
port is classically locked, and there is a new MAC address, or the port is dynamically locked,
and the maximum number of allowed addresses has been exceeded), the protection mechanism
is invoked, and one of the following actions can take place:
Frame is discarded
Frame is forwarded
Port is shut down
When the secure MAC address is seen on another port, the frame is forwarded, but the MAC
address is not learned on that port.
In addition to one of these actions, you can also generate traps, and limit their frequency and
number to avoid overloading the devices.

Table of Contents

Other manuals for Cisco SG350-10MP

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco SG350-10MP and is the answer not in the manual?

Cisco SG350-10MP Specifications

General IconGeneral
ModelSG350-10MP
CategorySwitch
PoE Budget130W
Switching Capacity20 Gbps
Forwarding Rate14.88 Mpps
Power SupplyInternal
Ports8 x 10/100/1000 PoE+ + 2 x Gigabit SFP
MAC Address Table Size16K
Jumbo Frame Support9216 bytes
ManagementWeb-based, CLI, SNMP
Operating Temperature0°C to 45°C (32°F to 113°F)
Storage Temperature-20°C to 70°C (-4°F to 158°F)
Operating Humidity10% to 90% relative humidity, non-condensing
Storage Humidity5% to 95% relative humidity, non-condensing
Dimensions (W x D x H)279.4 x 170 x 44 mm (11.0 x 6.7 x 1.73 in)

Related product manuals