365
The page for configuring advanced port security control appears.
Figure 399 Configuring advanced port security control
4.
Configure advanced port security control as described in
5.
Click
Apply
.
Table 127 Configuration items
Item
Description
Port
Select a port where you want to configure port security.
By default, port security is disabled on all ports, and access to the ports is not restricted.
Security Mode
Select a port security mode.
For more information about advanced security modes, see
.
Enable Intrusion
Protection
Specify whether to enable intrusion protection, and select an action to be taken upon
detection of illegal frames.
Available actions:
•
Disable Port Temporarily
—Disables the port for a period of time. The period can
be configured in the global settings. For more information, see "
•
Disable Port Permanently
—Disables the port permanently upon detecting an
illegal frame received on the port. The port does not come up unless you bring it up
manually.
•
Block MAC
—Adds the source MAC addresses of illegal frames to the blocked
MAC addresses list and discards the frames. All subsequent frames sourced from
a blocked source MAC address will be dropped. A blocked MAC address is
restored to normal state after being blocked for 3 minutes. The interval is fixed and
cannot be changed.
Enable Outbound
Restriction
Specify whether to enable the outbound traffic control, and select a control method.
Available control methods:
•
Only MAC-Known Unicasts
—Allows only unicasts frames with their destination
MAC addresses being authenticated to pass through.
•
Only Broadcasts and MAC-Known Unicasts
—Allows only broadcast and
unicasts packets with their destination MAC addresses being authenticated to pass
through.
•
Only Broadcasts, Multicasts, and MAC-Known Unicasts
—Allows only
broadcast, multicast, and unicasts packets with their destination MAC addresses
being authenticated to pass through.
Ignore
Authorization
Specify whether to configure the port to ignore the authorization information from the
authentication server.
The authorization information is delivered by the authentication server to the device after
an 802.1X user or MAC authenticated user passes authentication.
Summary of Contents for FlexNetwork NJ5000
Page 12: ...x Index 440 ...
Page 39: ...27 Figure 16 Configuration complete ...
Page 67: ...55 Figure 47 Displaying the speed settings of ports ...
Page 78: ...66 Figure 59 Loopback test result ...
Page 158: ...146 Figure 156 Creating a static MAC address entry ...
Page 183: ...171 Figure 171 Configuring MSTP globally on Switch D ...
Page 243: ...231 Figure 237 IPv6 active route table ...