
C
HAPTER
14
| Security Measures
Configuring Port Security
– 342 –
To show a list of IP addresses authorized for management access:
1.
Click Security, IP Filter.
2.
Select Show from the Action list.
Figure 189: Showing IP Addresses Authorized for Management Access
C
ONFIGURING
P
ORT
S
ECURITY
Use the Security > Port Security page to configure a switch port with one
or more device MAC addresses that are authorized to access the network
through that port.
When port security is enabled on a port, the switch stops learning new MAC
addresses on the specified port when it has reached a configured maximum
number. Only incoming traffic with source addresses already stored in the
dynamic or static address table will be authorized to access the network
through that port. If a device with an unauthorized MAC address attempts
to use the switch port, the intrusion will be detected and the switch can
automatically take action by disabling the port and sending a trap
message.
To use port security, specify a maximum number of addresses to allow on
the port and then let the switch dynamically learn the <source MAC
address, VLAN> pair for frames received on the port. Note that you can
also manually add secure addresses to the port using the Static Address
Table (
). When the port has reached the maximum number of
MAC addresses, the selected port will stop learning. The MAC addresses
already in the address table will be retained and will not age out. Any other
device that attempts to use the port will be prevented from accessing the
switch.
CLI R
EFERENCES
Summary of Contents for DG-FS4526E
Page 4: ...ABOUT THIS GUIDE 4...
Page 34: ...CONTENTS 34...
Page 50: ...TABLES 50...
Page 52: ...SECTION I Getting Started 52...
Page 62: ...CHAPTER 1 Introduction System Defaults 62...
Page 80: ...CHAPTER 2 Initial Switch Configuration Managing System Files 80...
Page 82: ...SECTION II Web Configuration 82...
Page 100: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 100...
Page 128: ...CHAPTER 4 Basic Management Tasks Resetting the System 128...
Page 166: ...CHAPTER 5 Interface Configuration VLAN Trunking 166...
Page 198: ...CHAPTER 6 VLAN Configuration Configuring VLAN Mirroring 198...
Page 516: ...CHAPTER 17 IP Services Displaying the DNS Cache 516...
Page 562: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 562...
Page 652: ...CHAPTER 22 SNMP Commands 652...
Page 660: ...CHAPTER 23 Remote Monitoring Commands 660...
Page 714: ...CHAPTER 24 Authentication Commands Management IP Filter 714...
Page 802: ...CHAPTER 27 Interface Commands 802...
Page 824: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 824...
Page 846: ...CHAPTER 32 Address Table Commands 846...
Page 874: ...CHAPTER 33 Spanning Tree Commands 874...
Page 886: ...CHAPTER 34 ERPS Commands 886...
Page 928: ...CHAPTER 35 VLAN Commands Configuring Voice VLANs 928...
Page 942: ...CHAPTER 36 Class of Service Commands Priority Commands Layer 3 and 4 942...
Page 998: ...CHAPTER 38 Multicast Filtering Commands Multicast VLAN Registration 998...
Page 1022: ...CHAPTER 39 LLDP Commands 1022...
Page 1064: ...CHAPTER 40 CFM Commands 1064...
Page 1084: ...CHAPTER 42 Domain Name Service Commands 1084...
Page 1090: ...CHAPTER 43 DHCP Commands DHCP Client 1090...
Page 1122: ...CHAPTER 44 IP Interface Commands IPv6 Interface 1122...
Page 1124: ...SECTION IV Appendices 1124...
Page 1130: ...APPENDIX A Software Specifications Management Information Bases 1130...
Page 1152: ...COMMAND LIST 1152...
Page 1161: ......
Page 1162: ...DG FS4526E 042012 HW R01...