12
P
ORT
S
ECURITY
C
ONFIGURATION
Port Security
Overview
Introduction
Port security is a security mechanism for network access control. It brings together
both 802.1x access control and MAC address authentication and allows for
combinations of these technologies.
Port security allows you to define various security modes that enable devices to
learn legal source MAC addresses, so that you can implement different network
security management as needed.
With port security enabled, packets whose source MAC addresses cannot be
learned by your switch in a security mode are considered illegal packets, The
events that cannot pass 802.1x authentication or MAC authentication are
considered illegal.
With port security enabled, upon detecting an illegal packet or illegal event, the
system triggers the corresponding port security features and takes pre-defined
actions automatically. This reduces your maintenance workload and greatly
enhances system security and manageability.
Port Security Features
The following port security features are provided:
■
NTK (need to know) feature: By checking the destination MAC addresses in
outbound data frames on the port, NTK ensures that the switch sends data
frames through the port only to successfully authenticated devices, thus
preventing illegal devices from intercepting network data.
■
Intrusion protection feature: By checking the source MAC addresses in inbound
data frames or the username and password in 802.1x authentication requests
on the port, intrusion protection detects illegal packets or events and takes a
pre-set action accordingly. The actions you can set include: disconnecting the
port temporarily/permanently, and blocking packets with the MAC address
specified as illegal.
■
Trap feature: When special data packets (generated from illegal intrusion,
abnormal login/logout or other special activities) are passing through the
switch port, the Trap feature enables the switch to send Trap messages to help
the network administrator monitor special activities.
Port Security Modes
Table 77 describes the available port security modes:
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...