Configuring Switch Information
273
Configuring Port Security
Network security can be enhanced by limiting access on a specific port only to users with specific
MAC addresses. The MAC addresses can be dynamically learned, up to that point, or they can be
statically configured. Locked port security monitors both received and learned packets that are received
on specific ports. Access to the locked port is limited to users with specific MAC addresses.
These addresses are either manually defined on the port, or learned on that port up to the point when it
is locked. When a packet is received on a locked port, and the packet’s source MAC address is not tied to
that port (either it was learned on a different port, or it is unknown to the system), the protection
mechanism is invoked, and can provide various options. Unauthorized packets arriving to a locked port
are either:
•
Forwarded
•
Discarded with no trap
•
Discarded with a trap
•
The port is shut down
Locked port security also enables storing a list of MAC addresses in the configuration file.
The MAC address list can be restored after the device has been reset.
In order to enable port security, enable the
Multiple Hosts
feature on the required ports.
Disabled ports are activated from the
Port Security
page. The
Ports
page provides links for configuring
port functionality including advanced features such as storm control and port mirroring, and for
performing virtual port tests.
To open the
Port Security
page, click
Switch
→
Network Security
→
Port Security
.
Figure 7-7.
Port Security
Summary of Contents for PowerConnect 35 SERIES
Page 1: ...w w w d e l l c o m s u p p o r t d e l l c o m Dell PowerConnect 35xx Systems User s Guide ...
Page 38: ...38 Hardware Description ...
Page 68: ...68 Configuring PowerConnect 3524 P and 3548 P ...
Page 404: ...404 Configuring Switch Information ...
Page 452: ...452 Configuring Quality of Service ...
Page 466: ...466 Glossary ...