EasyManua.ls Logo

Edge-Core ECS4310-26T User Manual

Edge-Core ECS4310-26T
142 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #97 background imageLoading...
Page #97 background image
– 97 –
15 PORT SECURITY
Port security is a feature that allows you to configure a switch port with a
maximum number of device MAC addresses that are authorized to access
the network through that port.
When port security is enabled on a port, the switch stops learning new MAC
addresses on the specified port when it has reached a configured maximum
number. Only incoming traffic with source addresses already stored in the
dynamic or static address table will be accepted as authorized to access
the network through that port. If a device with an unauthorized MAC
address attempts to use the switch port, the intrusion will be detected and
the switch can automatically take a specified action.
To use port security, specify a maximum number of addresses to allow on
the port and then let the switch dynamically learn the <source MAC
address, VLAN> pair for frames received on the port. Note that you can
also manually add secure addresses to the port using the Static Address
Table (see “Static MAC Addresses” on page 106). When the port has
reached the maximum number of MAC addresses the selected port will stop
learning. The MAC addresses already in the address table will be retained
and will not age out. Any other device that attempts to use the port will be
prevented from accessing the switch.
PARAMETERS
The following parameters are displayed on the Port Security page:
Port — Port number.
Security Enables or disables port security for the selected ports.
(Default: Disabled)
Maximum L2 Entry The maximum number of MAC addresses that
can be learned on a port. (Range: 0 - 16447, where 0 means disabled)
Action Indicates the action to be taken when a port security
violation is detected:
Trap to CPU: Send an SNMP trap message. (This is the default.)
Drop: Drop other traffic from the port.
Forward: No action is taken. Traffic is forwarded as normal.

Table of Contents

Other manuals for Edge-Core ECS4310-26T

Questions and Answers:

Edge-Core ECS4310-26T Specifications

General IconGeneral
BrandEdge-Core
ModelECS4310-26T
CategorySwitch
LanguageEnglish

Summary

ABOUT THIS GUIDE

PURPOSE

Describes the guide's objective for operating and using switch management functions.

AUDIENCE

Intended for network administrators with basic knowledge of switch functions, IP, and SNMP.

CONVENTIONS

Explains the use of Note, Caution, and Warning symbols for important information and hazards.

RELATED PUBLICATIONS

Lists the Installation Guide and online web-based help for switch features.

REVISION HISTORY

Summarizes changes made in each revision of the guide, including software version validity.

SECTION I GETTING STARTED

INTRODUCTION

Provides an overview of the switch and introduces basic concepts and required settings for management.

INITIAL SWITCH CONFIGURATION

Covers connecting to the switch and performing essential configuration procedures for network access.

SECTION II WEB CONFIGURATION

USING THE WEB INTERFACE

Explains how to connect to and use the switch's embedded HTTP web agent for configuration.

SYSTEM SETTINGS

Describes basic system settings, including displaying information, user accounts, and IP address configuration.

PORT SETTINGS

Details configuration options for port auto-negotiation, speed, duplex mode, and flow control.

LINK AGGREGATION

Explains how to create multiple links as one virtual aggregate link for increased bandwidth and redundancy.

CREATING VLANS

Covers isolating broadcast traffic and organizing network nodes into separate broadcast domains using VLANs.

VLAN STACKING

Describes VLAN Stacking (QinQ) for service providers to maintain customer-specific VLANs and expand VLAN space.

IGMP SNOOPING

Explains how the switch uses IGMP to filter multicast traffic and discover ports for multicast groups.

SPANNING TREE

Details how to detect and disable network loops, and provide backup links using STP and RSTP.

QUALITY OF SERVICE

Explains how to specify packet precedence for prioritized forwarding during network congestion.

LINK LAYER DISCOVERY PROTOCOL

Describes using LLDP to discover basic information about neighboring devices on the local broadcast domain.

SNMP SETTINGS

Covers configuring Simple Network Management Protocol (SNMP) for device management and monitoring.

PORT MIRRORING

Explains how to mirror traffic from source ports to a target port for real-time analysis.

PORT SECURITY

Details configuring a switch port with a maximum number of authorized MAC addresses to prevent unauthorized access.

BANDWIDTH CONTROL

Allows network managers to control the maximum rate for traffic received or transmitted on a port.

JUMBO FRAME

Explains enabling support for jumbo frames up to 9216 bytes for more efficient data transfers.

MANAGEMENT ACCESS FILTER

Describes creating a list of allowed IP addresses for management access to the switch.

MAC ADDRESS SECURITY

Covers configuring MAC address security, including forwarding tables and static MAC addresses.

802.1X SECURITY

Details configuring IEEE 802.1X port-based access control for network authentication.

GENERAL SECURITY SETTINGS

Covers other general security settings like IP Filter, Storm Control, Port Isolation, and Defence Engine.

PORT STATISTICS

Explains how to display standard statistics on network traffic passing through each port for problem identification.

MANAGEMENT TOOLS

Describes tools for managing the switch, including HTTP Upgrade, restoring defaults, and resetting.

SECTION III APPENDICES

SOFTWARE SPECIFICATIONS

Provides detailed specifications for software features, standards, and management information bases.

TROUBLESHOOTING

Offers solutions for common problems, particularly accessing the management interface and forgotten passwords.

Related product manuals