36
Chapter 4 - Configuration Management
ASUS GigaX 1024i+
•
Port
: Select the port to make the
configuration.
•
Admin
: Disable/enable port
security feature on the port.
•
Violation Mode
: Set the violation
mode. This action will be taken
when a violation occurs. It is a
security violation when one of these
situations occurs:
1) It is a security violation when the maximum numbers of secure MAC
addresses have been added to the address table, and a station whose
MAC addresses is not in the address table attempts to access the
interface.
2) An address learned or configured on one secure interface is seen
on another secure interface in the same VLAN. You can configure the
interface for one of the three violation modes:
a)
Protect
: In this mode, you are not notified that a security violation has
occurred.
b)
Restrict
: In this mode, you are notified that a security violation has
occurred. Specifically, an SNMP trap is sent, a syslog message is
logged, and the violation counter increments.
c)
Shutdown
: In this mode, a port security violation causes the interface
to become blocking state immediately. It also sends an SNMP trap,
logs a syslog message, and increments the violation counter.
•
Max MAC Addresses
: Set the maximum numbers of secure MAC
addresses. The valid value is from 1 to 132. The sum of this value for all
ports is less than or equal to the maximum number of secure MAC address
allowed in the switch.
•
Aging Time
: Set the aging time. The valid value is from 0 to 1440(mins).
The aging mechanism is only effective for dynamic secure MAC
addresses. If the time is 0, the aging mechanism is disabled for this port.
•
Aging Type
: Set the aging type to determine the action when the
dynamic secure MAC addresses are aged out. Two types of aging are
supported for each port:
a)
Absolute
: the secure addresses on the port are deleted after the
specified aging time.
b)
Inactivity
: the secure addresses on the port are deleted only if there
Figure 38. Port Configuration