Transition Networks
S4224 Web User Guide
33558 Rev. C
Page 91 of 669
Port Security Limit Control Configuration
Configuration > Security > Network > Limit Control
The
Configuration
>
Security
>
Network
>
Limit
Control
menu path lets you to configure the Port
Security Limit Control system-level and port-level settings.
Limit Control allows for limiting the number of users on a given port. A user is identified by a MAC address
and VLAN ID. If Limit Control is enabled on a port, the limit specifies the maximum number of users on
the port. If this number is exceeded, an action is taken. The action can be one of the four different actions
described below.
The Limit Control module utilizes a lower-layer module (the Port Security module) which manages MAC
addresses learned on the port. The Limit Control configuration consists of two sections, a system-wide
and a port-wide configuration table.
System Configuration
Mode
Indicates if Limit Control is globally enabled or disabled on the S4224. If globally disabled, other
modules may still use the underlying functionality, but limit checks and corresponding actions are
disabled.
Aging Enabled
If checked, secured MAC addresses are subject to aging as discussed under ‘Aging Period’ below.
To keep the MAC table updated, an aging scan is conducted to remove entries that were not recently
accessed. This ensures that stations moved to new locations are not permanently prevented from
receiving frames in their new location. It also frees up MAC table entries occupied by obsolete
stations to make room for new stations. The IEEE 802.1d recommends 300 seconds per entry.