![Korenix JetNet 5228G Series User Manual Download Page 442](http://html1.mh-extra.com/html/korenix/jetnet-5228g-series/jetnet-5228g-series_user-manual_1997769442.webp)
Command Line Interface
4-132
4
Command Usage
• If you enable port security, the switch stops learning new MAC addresses on
the specified port when it has reached a configured maximum number. Only
incoming traffic with source addresses already stored in the dynamic or static
address table will be accepted.
• Use the
port security
command to enable security on a port. Then use the
port security
action
command to set the response to a port security violation,
and the
port security max-mac-count
command to set the maximum
number of addresses allowed on a port.
• You can also manually add secure addresses with the
mac-address-table
static
command.
• A secure port has the following restrictions:
- Cannot be connected to a network interconnection device.
- Cannot be a trunk port.
• If a port is disabled due to a security violation, it must be manually re-enabled
using the
no
shutdown
command.
Example
The following example enables port security for port 5, and sets the response to a
security violation to issue a trap message:
Related Commands
shutdown (4-177)
mac-address-table static (4-197)
show mac-address-table (4-199)
Network Access
(
MAC Address Authentication)
Network Access authentication controls access to the network by authenticating the
MAC address of each host that attempts to connect to a switch port. Traffic received
from a specific MAC address is forwarded by the switch only if the source MAC
address is successfully authenticated by a central RADIUS server. While
authentication for a MAC address is in progress, all traffic is blocked until
authentication is completed. Once successfully authenticated, the RADIUS server
may optionally assign VLAN settings for the switch port.
Console(config)#interface ethernet 1/5
Console(config-if)#port security
Console(config-if)#port security action trap
Console(config-if)#
Table 4-42 Network Access
Command
Function
Mode
Page
network-access mode
Enables MAC authentication on an interface
IC
4-133
network-access
max-mac-count
Sets a maximum for authenticated MAC addresses on an
interface
IC
4-134
mac-authentication
intrusion-action
Determines the port response when a connected host fails
MAC authentication.
IC
4-135
Summary of Contents for JetNet 5228G Series
Page 3: ...www edge core com 2 24FE 4G Layer 2 4 Ethernet Switch Management Guide V1 1...
Page 24: ...Tables xx...
Page 310: ...Configuring the Switch 3 264 3...
Page 636: ...Command Line Interface 4 326 4...
Page 650: ...Glossary Glossary 8...
Page 656: ...Index 6 Index...
Page 657: ......
Page 658: ......