–
298
–
Chapter 12
| Security Measures
Configuring Port Security
Configuring Port Security
Use the Security > Port Security page to configure the maximum number of device
MAC addresses that can be learned by a switch port, stored in the address table,
and authorized to access the network.
When port security is enabled on a port, the switch stops learning new MAC
addresses on the specified port when it has reached a configured maximum
number. Only incoming traffic with source addresses already stored in the address
table will be authorized to access the network through that port. If a device with an
unauthorized MAC address attempts to use the switch port, the intrusion will be
detected and the switch can automatically take action by disabling the port and
sending a trap message.
Command Usage
◆
The default maximum number of MAC addresses allowed on a secure port is
zero (that is, disabled). To use port security, you must configure the maximum
number of addresses allowed on a port.
◆
To configure the maximum number of address entries which can be learned on
a port, and then specify the maximum number of dynamic addresses allowed.
The switch will learn up to the maximum number of allowed address pairs
<source MAC address, VLAN> for frames received on the port. When the port
has reached the maximum number of MAC addresses, the port will stop
learning new addresses. The MAC addresses already in the address table will be
retained and will not be aged out.
Note that you can manually add additional secure addresses to a port using the
Static Address Table (
◆
When the port security state is changed from enabled to disabled, all
dynamically learned entries are cleared from the address table.
◆
If port security is enabled, and the maximum number of allowed addresses are
set to a non-zero value, any device not in the address table that attempts to use
the port will be prevented from accessing the switch.
◆
If a port is disabled (shut down) due to a security violation, it must be manually
re-enabled from the Interface > Port > General page (
◆
A secure port has the following restrictions:
■
It cannot be used as a member of a static or dynamic trunk.
■
It should not be connected to a network interconnection device.
■
RSPAN and port security are mutually exclusive functions. If port security is
enabled on a port, that port cannot be set as an RSPAN uplink port. Also,
when a port is configured as an RSPAN uplink port, source port, or
destination port, port security cannot be enabled on that port.
Summary of Contents for GEL-5261
Page 14: ...14 Contents Glossary 551 Index 559...
Page 26: ...26 Figures...
Page 30: ...30 Section I Getting Started...
Page 42: ...42 Section II Web Configuration IP Services on page 527...
Page 45: ...Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface 45 Figure 1 Dashboard...
Page 62: ...62 Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface...
Page 180: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 180...
Page 208: ...Chapter 8 Congestion Control Storm Control 208 Figure 121 Configuring Storm Control...
Page 228: ...228 Chapter 10 Quality of Service Attaching a Policy Map to a Port...
Page 332: ...Chapter 12 Security Measures ARP Inspection 332 Figure 207 Displaying the ARP Inspection Log...
Page 436: ...Chapter 13 Basic Administration Protocols LBD Configuration 436...
Page 488: ...488 Chapter 14 Multicast Filtering Filtering MLD Query Packets on an Interface...
Page 498: ...Chapter 15 IP Tools Address Resolution Protocol 498...
Page 517: ...517 Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 interface...
Page 542: ...540 Section III Appendices...
Page 560: ...Glossary 558...
Page 570: ...568 Index E062017 ST R01...