Security
54
2.5
Port Security
RM Web
Release
6.0
07/2010
2.5 Port Security
The device allows you to configure each port so that unauthorized access is
prevented. Depending on your selection, the device checks the MAC
address or the IP address of the connected device.
In the “Configuration” frame, you set whether the port security works with
MAC or with IP addresses.
Set individual parameters for each port in the port table.
Name Meaning
MAC-Based Port Security Check source MAC address of the received data packet.
IP-Based Port Security Translate source IP address when entering in MAC address
and then check source MAC address of the received data
packet.
Table 5: Configuration of port security globally for all ports
Name Meaning
Module Module of the device on which the port is located.
Port Port to which this entry applies.
Port Status enabled: Port is switched on and transmitting.
disabled: Port is switched off and not transmitting.
The port is switched on if
- an authorized address accesses the port
or
- an unauthorized address attempts to access the port and
trapOnly or none is selected under “Action”.
The port is switched off if
- an unauthorized address attempts to access the port and
portDisable is selected under “Action”.
Table 6: Configuration of port security for a single port