Layer 2 Switching Commands
297
User Guidelines
Port security allows the network administrator to secure interfaces by
specifying (or learning) the allowable MAC addresses on a given port. Packets
with a matching source MAC address are forwarded normally. All other host
packets are discarded. Port security operates on access, trunk and general
mode ports.
Two methods are used to implement port security: dynamic locking and static
locking. Static locking further has an optional sticky mode.
Dynamic locking implements a ‘first arrival’ mechanism for MAC locking.
The administrator specifies how many dynamic addresses may be learned on
the secure port. If the limit has not been reached, then a packet with an
unknown source MAC address is learned and forwarded normally. If the MAC
address limit has been reached, the packet is discarded, the MAC address is
not learned, and a violation is raised. The administrator can disable dynamic
learning by setting the number of allowable dynamic entries to zero. This
causes all packets with unknown MAC addresses to be considered as
violations.
When a port security enabled link goes down, all of the dynamically learned
addresses are removed from the MAC forwarding database. When the link is
restored, that port can once again learn MAC addresses up to the
administrator specified limit.
A dynamically learned MAC address is eligible to be aged out if another
packet with that MAC address is not seen within the age-out time.
Dynamically learned MAC addresses are also eligible to be re-learned on
another port if station movement occurs.
Static locking allows the administrator to specify a list of MAC addresses that
are allowed on a port. The behavior of packets is the same as for dynamic
learning once the dynamic limit has been reached: only packets with a known
source MAC address can be forwarded. Any packets with source MAC
addresses that are not configured are discarded. The switch treats this as
violation.
If the administrator knows the specific MAC address (or addresses) that will
be connected to a particular port, she can specify those addresses as static
entries. By setting the number of allowable dynamic entries to zero, only
packets with a source MAC address matching a MAC address in the static list
are forwarded.
Содержание N1100-ON
Страница 2: ......
Страница 4: ......
Страница 258: ...Using the CLI 258 ...
Страница 488: ...Layer 2 Switching Commands 488 Operational State Querier Operational version 1 ...
Страница 656: ...Layer 2 Switching Commands 656 10 ...
Страница 1128: ...Audio Visual Bridging Commands 1128 ...
Страница 1186: ...Data Center Technology Commands 1186 ...
Страница 1414: ...Layer 3 Routing Commands 1414 Command History Introduced in version 6 2 0 1 firmware Example console route map set metric 6432 ...
Страница 1435: ...Layer 3 Routing Commands 1435 Number of Joins 7 Number of Groups 1 ...
Страница 1598: ...Layer 3 Routing Commands 1598 Vl10 Rx 0 0 0 0 0 0 0 Tx 2 0 0 0 0 0 0 Invalid Packets Received 0 ...
Страница 1621: ...Layer 3 Routing Commands 1621 Vl10 Rx 0 0 0 0 0 0 0 Tx 2 0 0 0 0 0 0 Invalid Packets Received 0 ...
Страница 2330: ......
Страница 2331: ...www dell com support dell com Printed in the U S A ...
Страница 2332: ......