104
C
HAPTER
11: M
AKING
Y
OUR
N
ETWORK
S
ECURE
Port Security
The Switch 4400 supports the following port security modes, which you
can set for an individual port or a range of ports:
■
No Security
Port security is disabled and all network traffic is forwarded through
the port without any restrictions.
■
Continuous Learning
MAC addresses are learned continuously by the port until the number
of authorized addresses specified is reached. When this number is
exceeded the first address that was learned by the port is deleted,
allowing a new address to be learned.
■
Automatic Learning
MAC addresses are learned continuously by the port until the number
of authorized addresses specified is reached. When this number is
exceeded the port automatically stops learning addresses and
Disconnect Unauthorized Device (DUD) is enabled on the port. For
further information see
“What is Disconnect Unauthorized Device
(DUD)?”
on
page 107
.
■
Network Login
When the user has been successfully authorized, all network traffic is
forwarded through the port without any restrictions. For further
information see
“What is Network Login?”
on
page 105
.
■
Network Login (Secure)
When the user has been successfully authorized, only network traffic
that is received from the authorized client device is forwarded through
the port. The source MAC address in received packets is used to
determine this; all traffic from other network devices is filtered.
Disconnect Unauthorized Device (DUD) is enabled on the port.
■
Network Login with NBX
This mode allows an NBX phone and a client device to be used on the
same Switch port. The client device is connected to the user port on
the NBX phone, which in turn is connected to the Switch port. Traffic
on the NBX phone is automatically forwarded. Traffic on the client
device is forwarded when the user has been successfully authorized.
Disconnect Unauthorized Device (DUD) is enabled on the port.
Содержание 3C17205-US - Corp SUPERSTACK 3 SWITCH 4400...
Страница 8: ...GLOSSARY INDEX...
Страница 14: ...14...
Страница 26: ...26 CHAPTER 1 SWITCH FEATURES OVERVIEW...
Страница 44: ...44 CHAPTER 3 USING MULTICAST FILTERING...
Страница 55: ...How STP Works 55 Figure 13 STP configurations...
Страница 58: ...58 CHAPTER 4 USING RESILIENCE FEATURES...
Страница 84: ...84 CHAPTER 7 STATUS MONITORING AND STATISTICS...
Страница 92: ...92 CHAPTER 8 SETTING UP VIRTUAL LANS...
Страница 98: ...98 CHAPTER 9 USING WEBCACHE SUPPORT...
Страница 120: ...120 CHAPTER 12 POWER MANAGEMENT AND CONTROL...
Страница 122: ...122...
Страница 126: ...126 APPENDIX A CONFIGURATION RULES...
Страница 134: ...134 APPENDIX B NETWORK CONFIGURATION EXAMPLES...
Страница 150: ...150 GLOSSARY...