
FL SWITCH MM HS
4-32
PHOENIX CONTACT
6874_en_16
"Ports/Port Mirroring" menu
Activation/deactivation and setting of port mirroring. Port mirroring is used to passively read
data that is being transmitted via a selected port. To do this a measuring instrument (PC) is
connected to the destination port, which records the data, yet must not itself be activated.
Figure 4-39
"Port Mirroring" web page
"Ports/Port Security" menu
In order to make individual settings for each port, the "Port Security" function on the "Switch
Station/Services" page must first be activated. The following options can be selected under
"Security Mode":
–
None
No security settings for this port.
–
Trap only
When a disabled MAC address accesses a port, a trap is sent to the pre-defined trap
targets. The port is not blocked.
If the source port is one of the ports in the range port 1 to port 8, then another port in this
group should be used as the destination port in order to avoid CRC errors and packets
being lost. The same applies for ports 9 to 16 and ports 17 to 24.
Multicast data packets of created multicast groups cannot be mirrored. Enter the
destination port in the relevant multicast group in order to enable multicast packets to be
received at the set destination port.
The port capacity is calculated according to the set transmission parameters. Example: A
source port is operated at 100 Mbps and reaches a capacity of 5%. The destination port
is operated at 10 Mbps. Therefore, with the same volume of data the destination port
reaches a capacity of 50%.
If ports are set with the same value, port mirroring will be disabled. The source port is set
to "0".
A trap is sent for each MAC address that accesses a port illegally. If this MAC address
accesses this port again after the aging time has elapsed and the MAC address has been
deleted from the MAC address table, another trap is sent. However, if the duration of illegal
access is shorter than the aging time, only one trap is sent following the first access
attempt.
RSPSupply - 1-888-532-2706 - www.RSPSupply.com
http://www.RSPSupply.com/p-14178-Phoenix-Contact-2832357-FL-IF-2TX-VS-RJ-D-Media-Module-for-Modular-Switch.aspx