104
C
HAPTER
11: M
AKING
Y
OUR
N
ETWORK
S
ECURE
Port Security
The Switch 4400 supports the following port security modes, which you
can set for an individual port or a range of ports:
■
No Security
Port security is disabled and all network traffic is forwarded through
the port without any restrictions.
■
Continuous Learning
MAC addresses are learned continuously by the port until the number
of authorized addresses specified is reached. When this number is
exceeded the first address that was learned by the port is deleted,
allowing a new address to be learned.
■
Automatic Learning
MAC addresses are learned continuously by the port until the number
of authorized addresses specified is reached. When this number is
exceeded the port automatically stops learning addresses and
Disconnect Unauthorized Device (DUD) is enabled on the port. For
further information see
“What is Disconnect Unauthorized Device
(DUD)?”
on
page 107
.
■
Network Login
When the user has been successfully authorized, all network traffic is
forwarded through the port without any restrictions. For further
information see
“What is Network Login?”
on
page 105
.
■
Network Login (Secure)
When the user has been successfully authorized, only network traffic
that is received from the authorized client device is forwarded through
the port. The source MAC address in received packets is used to
determine this; all traffic from other network devices is filtered.
Disconnect Unauthorized Device (DUD) is enabled on the port.
■
Network Login with NBX
This mode allows an NBX phone and a client device to be used on the
same Switch port. The client device is connected to the user port on
the NBX phone, which in turn is connected to the Switch port. Traffic
on the NBX phone is automatically forwarded. Traffic on the client
device is forwarded when the user has been successfully authorized.
Disconnect Unauthorized Device (DUD) is enabled on the port.
Summary of Contents for 3C17205-US - Corp SUPERSTACK 3 SWITCH 4400...
Page 8: ...GLOSSARY INDEX...
Page 14: ...14...
Page 26: ...26 CHAPTER 1 SWITCH FEATURES OVERVIEW...
Page 44: ...44 CHAPTER 3 USING MULTICAST FILTERING...
Page 55: ...How STP Works 55 Figure 13 STP configurations...
Page 58: ...58 CHAPTER 4 USING RESILIENCE FEATURES...
Page 84: ...84 CHAPTER 7 STATUS MONITORING AND STATISTICS...
Page 92: ...92 CHAPTER 8 SETTING UP VIRTUAL LANS...
Page 98: ...98 CHAPTER 9 USING WEBCACHE SUPPORT...
Page 120: ...120 CHAPTER 12 POWER MANAGEMENT AND CONTROL...
Page 122: ...122...
Page 126: ...126 APPENDIX A CONFIGURATION RULES...
Page 134: ...134 APPENDIX B NETWORK CONFIGURATION EXAMPLES...
Page 150: ...150 GLOSSARY...