![Hirschmann MS30, Power MICE, MACH 4000, OCTOPUS User Manual Download Page 80](http://html1.mh-extra.com/html/hirschmann/ms30-power-mice-mach-4000-octopus/ms30-power-mice-mach-4000-octopus_user-manual_2138036080.webp)
Protection from unauthorized access
80
6.4 Port access control
Layer 2 Enhanced with Layer 2 Professional
Release 1.0 10/05
6.4.2 Defining port access control
V
Select the
Security:Port Security
dialog.
V
First select, whether you wish the MAC based or the IP based port
security.
V
If you have selected MAC based you enter in the “Allowed MAC
address” column the MAC address of the device with which a data
exchange at this port is permitted. Without entry, reception from all
devices is allowed.
D
The “Current MAC address” column shows the MAC address of the
device from which data was last received. By pressing the left mouse
button, you can copy an entry from the “Current MAC address”
column into the “Allowed MAC address” column.
V
If you selected IP based, enter in the column “Allowed IP addess” the
IP-address of the device, with which data exchange at this port is al-
lowed. Without entry, reception from all devices is allowed.
V
In the “Action” column you select whether an unauthorized access at-
tempt should be followed by
– no action (none) or
– the sending of an alarm (trapOnly) or
– switching off the port by making a corresponding entry in the port
configuration table (see
“Configuring ports” on page 67
) and sending
an alarm (trap) (portDisable).
Summary of Contents for MS30, Power MICE, MACH 4000, OCTOPUS
Page 8: ...Contents 8 Layer 2 Enhanced with Layer 2 Professional Release 1 0 10 05...
Page 10: ...About this Manual 10 Layer 2 Enhanced with Layer 2 Professional Release 1 0 10 05...
Page 14: ...Introduction 14 Layer 2 Enhanced with Layer 2 Professional Release 1 0 10 05...
Page 194: ...188 Index Layer 2 Enhanced with Layer 2 Professional Release 1 0 10 05...
Page 195: ......
Page 196: ......