78
C
HAPTER
10: M
AKING
Y
OUR
N
ETWORK
S
ECURE
Port Security
The Switch supports the following port security modes, which you can set
for an individual port or a range of ports:
■
No Security
Port security is disabled and all network traffic is forwarded through
the port without any restrictions.
■
Continuous Learning
MAC addresses are learned continuously by the port until the number
of authorized addresses specified is reached. When this number is
exceeded the first address that was learned by the port is deleted,
allowing a new address to be learned.
■
Automatic Learning
MAC addresses are learned continuously by the port until the number
of authorized addresses specified is reached. When this number is
exceeded the port automatically stops learning addresses and
Disconnect Unauthorized Device (DUD) is enabled on the port. For
further information see
“What is Disconnect Unauthorized Device
(DUD)?”
on
page 85
.
■
Learning Off
Only traffic received from an authorized address (either configured by
management or learned while the port was prevously operating in the
"Automatic Learning" mode) is forwarded. While in this mode the
DUD operation is enabled. When a port in this mode has learned the
maximum number of authorized addresses configured for the port
then it will transition to the "Learning Off" mode.
■
Network Login
When a 802.1X client has been successfully authorized, all network
traffic is forwarded through the port without any restrictions. For
further information see
“What is Network Login?”
on
page 80
.
■
Network Login (Secure)
When a 802.1X client has been successfully authorized, only network
traffic that is received from the authorized client device is forwarded
through the port. The source MAC address in received packets is used
to determine this; all traffic from other network devices is filtered.
Disconnect Unauthorized Device (DUD) is enabled on the port.
dua1730-0bAA03.book Page 78 Monday, July 11, 2005 11:14 AM
Содержание 3C17300-US - SuperStack 3 Switch 4226T
Страница 7: ...D STANDARDS SUPPORTED GLOSSARY INDEX dua1730 0bAA03 book Page 7 Monday July 11 2005 11 14 AM ...
Страница 8: ...dua1730 0bAA03 book Page 8 Monday July 11 2005 11 14 AM ...
Страница 14: ...14 dua1730 0bAA03 book Page 14 Monday July 11 2005 11 14 AM ...
Страница 22: ...22 CHAPTER 1 SWITCH FEATURES OVERVIEW dua1730 0bAA03 book Page 22 Monday July 11 2005 11 14 AM ...
Страница 38: ...38 CHAPTER 3 USING MULTICAST FILTERING dua1730 0bAA03 book Page 38 Monday July 11 2005 11 14 AM ...
Страница 47: ...How STP Works 47 Figure 11 STP configurations dua1730 0bAA03 book Page 47 Monday July 11 2005 11 14 AM ...
Страница 64: ...64 CHAPTER 7 STATUS MONITORING AND STATISTICS dua1730 0bAA03 book Page 64 Monday July 11 2005 11 14 AM ...
Страница 86: ...86 CHAPTER 10 MAKING YOUR NETWORK SECURE dua1730 0bAA03 book Page 86 Monday July 11 2005 11 14 AM ...
Страница 92: ...92 dua1730 0bAA03 book Page 92 Monday July 11 2005 11 14 AM ...
Страница 96: ...96 APPENDIX A CONFIGURATION RULES dua1730 0bAA03 book Page 96 Monday July 11 2005 11 14 AM ...
Страница 100: ...100 APPENDIX B NETWORK CONFIGURATION EXAMPLES dua1730 0bAA03 book Page 100 Monday July 11 2005 11 14 AM ...
Страница 108: ...108 APPENDIX D STANDARDS SUPPORTED dua1730 0bAA03 book Page 108 Monday July 11 2005 11 14 AM ...
Страница 122: ...122 INDEX dua1730 0bAA03 book Page 122 Monday July 11 2005 11 14 AM ...