1-2
Port Security Features
NTK
The need to know (NTK) feature checks the destination MAC addresses in outbound frames and allows
frames to be sent to only devices passing authentication, thus preventing illegal devices from
intercepting network traffic.
Intrusion protection
The intrusion protection feature checks the source MAC addresses in inbound frames and takes a
pre-defined action accordingly upon detecting illegal frames. The action may be disabling the port
temporarily, disabling the port permanently, or blocking frames from the MAC address for three minutes
(unmodifiable).
Trap
The trap feature enables the device to send trap messages upon detecting specified frames that result
from, for example, intrusion or user login/logout operations, helping you monitor special activities.
Port Security Modes
Table 1-1
details the port security modes.
Table 1-1
Port security modes
Security mode
Description
Features
noRestrictions
Port security is disabled on the port and access
to the port is not restricted.
In this mode, neither
the NTK nor the
intrusion protection
feature is triggered.
autoLearn
In this mode, a port can learn a specified
number of MAC addresses and save those
addresses as secure MAC addresses. It
permits only frames whose source MAC
addresses are secure MAC addresses or static
MAC addresses configured by using the
mac-address static
command.
When the number of secure MAC addresses
reaches the upper limit, the port changes to
work in secure mode and no more secure MAC
addresses can be added.
secure
In this mode, learning MAC address is disabled
on the port. The port permits only frames whose
source MAC addresses are secure MAC
addresses or static MAC addresses configured
by using the
mac-address static
command.
In either mode, the
device will trigger NTK
and intrusion
protection upon
detecting an illegal
frame.
In autoLearn mode,
dynamic MAC
address learning is
disabled.
userLogin
In this mode, a port performs 802.1X
authentication of users in
portbased
mode.
A port in this mode can service multiple 802.1X
users, but allows only one at a moment.
In this mode, neither
NTK nor intrusion
protection will be
triggered.
Содержание S7902E
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1 ...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist ...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45 ...
Страница 598: ...ii ...
Страница 1757: ...4 9 ...
Страница 1770: ...6 4 ...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface ...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002 ...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20 ...