– 87 –
C
HAPTER
4
| Configuring the Switch
Configuring Security
P
ATH
Advanced Configuration, Security, Network, Limit Control
P
ARAMETERS
The following parameters are displayed:
System Configuration
◆
Mode – Enables or disables Limit Control is globally on the switch. If
globally disabled, other modules may still use the underlying
functionality, but limit checks and corresponding actions are disabled.
◆
Aging Enabled – If enabled, secured MAC addresses are subject to
aging as discussed under Aging Period.
With aging enabled, a timer is started once the end-host gets secured.
When the timer expires, the switch starts looking for frames from the
end-host, and if such frames are not seen within the next Aging Period,
the end-host is assumed to be disconnected, and the corresponding
resources are freed on the switch.
◆
Aging Period – If Aging Enabled is checked, then the aging period is
controlled with this parameter. If other modules are using the
underlying port security for securing MAC addresses, they may have
other requirements for the aging period. The underlying port security
will use the shortest requested aging period of all modules that use this
functionality. (Range: 10-10,000,000 seconds; Default: 3600 seconds)
Port Configuration
◆
Port – Port identifier.
◆
Mode – Controls whether Limit Control is enabled on this port. Both
this and the global Mode must be set to Enabled for Limit Control to be
in effect. Notice that other modules may still use the underlying port
security features without enabling Limit Control on a given port.
◆
Limit – The maximum number of MAC addresses that can be secured
on this port. This number cannot exceed 1024. If the limit is exceeded,
the corresponding action is taken.
The switch is “initialized” with a total number of MAC addresses from
which all ports draw whenever a new MAC address is seen on a Port
Security-enabled port. Since all ports draw from the same pool, it may
happen that a configured maximum cannot be granted if the remaining
ports have already used all available MAC addresses.
◆
Action – If Limit is reached, the switch can take one of the following
actions:
■
None: Do not allow more than the specified Limit of MAC addresses
on the port, but take no further action.
■
Trap: If Limit + 1 MAC addresses is seen on the port, send an SNMP
trap. If Aging is disabled, only one SNMP trap will be sent, but with
Summary of Contents for EX26262
Page 1: ...Layer 2 Gigabit PoE Ethernet Switch Management Guide...
Page 2: ......
Page 3: ...MANAGEMENT GUIDE...
Page 4: ......
Page 6: ...6 ABOUT THIS GUIDE...
Page 18: ...18 FIGURES...
Page 20: ...20 TABLES...
Page 22: ...22 SECTION I Getting Started...
Page 34: ...34 SECTION II Web Configuration...
Page 46: ...46 CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface...
Page 290: ...290 CHAPTER 5 Monitoring the Switch Displaying Information About Flow Sampling...
Page 294: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 294...
Page 300: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 300...
Page 302: ...302 SECTION III Appendices...
Page 320: ...GLOSSARY 320...
Page 325: ......
Page 326: ......