EasyManua.ls Logo

Transition Networks SM8TAT2SA - P Ort S Ecurity

Transition Networks SM8TAT2SA
248 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
12-3 Port Security
12-3.1 Configuration
This section shows you how to configure the Port Security settings of the Switch. You can use
the Port Security feature to restrict input to an interface by limiting and identifying MAC
addresses.
Web Interface
To configure a Port Security Configuration in the web interface:
1. Click Security, Port Security, Configuration.
2. Select “Enabled” in the Mode of System Configuration.
3. Set Mode (Enabled or Disabled), Limit, Action (Trap, Shutdown, Trap & Shutdown) for
each port.
4. Click the Apply button to save the settings.
5. To cancel the settings click the Reset button to restore previously saved values.
Figure 12-3.1: Port Security Configuration
Parameter descriptions:
System Configuration
Mode: Indicates if Limit Control is globally enabled or disabled on the switch. If globally disabled, other
modules may still use the underlying functionality, but limit checks and corresponding actions are
disabled.
Port Configuration table has one row for each switch port and a number of columns:
Port: The port number to which the configuration below applies.
Mode: Controls whether Limit Control is enabled on this port. Both this and the Global Mode must be
set to Enabled for Limit Control to be in effect. Notice that other modules may still use the underlying
port security features without enabling Limit Control on a given port.

Table of Contents

Related product manuals