FUJITSU PSWITCH User’s Guide
54 December/2018
a set of source ports, a set of destination ports and VLAN information.
Any packet with a particular static MAC address in a particular VLAN is admitted
only if the ingress port is in the set of source ports; otherwise, the packet is
dropped. On the egress side, the packet, if admitted, is sent out of all the ports that
are in the set of destination ports.
Upon ingress, each packet's destination MAC address is compared against the
forwarding database. If the address is not in the table, the packet is flooded to all
members of the VLAN. If the address is in the table, then it is checked to see if it
has been defined as a filter. If the MAC address is not defined as a filter, then the
packet is forwarded to destination port.
If the specific destination MAC address is defined as a filter, then the ingress port
number is compared to the set of source ports listed for the address. If the port of
ingress is not in the set of source ports, then the packet is immediately discarded.
If the ingress port is a member of the set of source ports, then the packet is
admitted.
At the egress port, if the destination port number is in the set of destination ports,
the packet is transmitted. If the destination port is not in the set of destination
ports, then the packet is discarded.
Static entries are never aged and can only be removed by user command. The
number of static mac filters supported on the system is different for MAC filters
where source ports are configured and MAC filters where destination ports are
configured.
For current this platforms, you can configure the following combinations:
Unicast MAC and source port -
Multicast MAC and source port -
Multicast MAC and destination port (only) -
Multicast MAC and source ports and destination ports -
3.1.2.4.4. Port Security
Port Security allows a network administrator to secure the network by locking down
allowable MAC addresses on a given port. Packets with a matching source MAC
address (secure packets) are forwarded. All other packets (unsecure packets) are
restricted.
Fujitsu Port Security implements two traffic filtering methods:
Dynamic Locking: