Configuring the Threshold ................................................................................................................................................135
Viewing DDM Configuration .............................................................................................................................................141
Viewing DDM Status ............................................................................................................................................................. 142
Appendix: Default Parameters ...................................................................................................................................143
Managing MAC Address Table
MAC Address Table .......................................................................................................................................................145
Overview ...................................................................................................................................................................................................145
Supported Features ...........................................................................................................................................................................145
Address Configurations ...............................................................................................................................................147
Using the GUI .........................................................................................................................................................................................147
Adding Static MAC Address Entries ..........................................................................................................................147
Modifying the Aging Time of Dynamic Address Entries...................................................................................149
Adding MAC Filtering Address Entries.......................................................................................................................150
Viewing Address Table Entries ....................................................................................................................................... 150
Using the CLI ..........................................................................................................................................................................................151
Adding Static MAC Address Entries ..........................................................................................................................151
Modifying the Aging Time of Dynamic Address Entries...................................................................................152
Adding MAC Filtering Address Entries.......................................................................................................................153
Security Configurations ...............................................................................................................................................155
Using the GUI .........................................................................................................................................................................................155
Configuring MAC Notification Traps ...........................................................................................................................155
Limiting the Number of MAC Addresses Learned in VLANs .........................................................................156
Using the CLI ..........................................................................................................................................................................................158
Configuring MAC Notification Traps ...........................................................................................................................158
Limiting the Number of MAC Addresses in VLANs ............................................................................................160
Example for Security Configurations ......................................................................................................................162
Network Requirements .....................................................................................................................................................................162
Configuration Scheme .....................................................................................................................................................................162
Using the GUI .........................................................................................................................................................................................163
Using the CLI ..........................................................................................................................................................................................164
Appendix: Default Parameters ...................................................................................................................................165
Configuring 802.1Q VLAN
Overview ...........................................................................................................................................................................167
802.1Q VLAN Configuration .......................................................................................................................................168
Using the GUI .........................................................................................................................................................................................169