![Evidence Cross-8/HPoE-10G Скачать руководство пользователя страница 227](http://html1.mh-extra.com/html/evidence/cross-8-hpoe-10g/cross-8-hpoe-10g_user-manual_2445999227.webp)
frames from the end-host, and if such frames are not seen within the next Aging Period, the
end-host is assumed to be disconnected, and the corresponding resources are freed on the
switch.
Hold Time :
The hold time - measured in seconds - is used to determine how long a MAC address is
held in the MAC table if it has been found to violate the limit. Valid range is
between 10 and 10000000 seconds
with
a
default
of 300 seconds.
The reason for holding a violating MAC address in the MAC table is primarily to ensure that
the same MAC address doesn't give rise to continuous notifications (if notifications on
violation count is enabled).
Port Configuration
The table has one row for each port on the selected switch and a number of columns,
which are:
Port :
The port number to which the configuration below applies.
Mode :
Controls whether Limit Control is enabled on this port. Both this and the
be set to Enabled for Limit Control to be in effect. Notice that other modules may still use
the underlying port security features without enabling Limit Control on a given port.
Limit :
The maximum number of MAC addresses that can be secured on this port. This number
cannot exceed 1024. If the limit is exceeded, the corresponding
The switch is "born" with a total number of MAC addresses from which all ports draw
whenever a new MAC address is seen on a Port Security-enabled port. Since all ports draw
from the same pool, it may happen that a configured maximum cannot be granted, if the
remaining ports have already used all available MAC addresses.
Violation Mode :
is reached, the switch can take one of the following actions:
Protect: Do not allow more than
MAC addresses on the port, but take no further
is reached, subsequent MAC addresses on the port will be counted and
marked as violating. Such MAC addreses are removed from the MAC table when the
MAC addresses can be marked as violating at any
given
time.
is reached, one additional MAC address will cause the port to be shut
down. This implies that all secured MAC addresses be removed from the port, and no new
addresses be learned. There are three ways to re-open the port:
1) In the "Configuration→Ports" page's "Configured" column, first disable the port, then
restore
the
original
mode.
2) Make a Port Security configuration change on the port.
3) Boot the switch.
Violation Limit
The maximum number of MAC addresses that can be marked as violating on this port. This
number cannot exceed 1023. Default is 4. It is only used when
State :
This column shows the current state of the port as seen from the Limit Control's point of
view. The state takes one of four values:
Disabled:
Limit Control is either globally disabled or disabled on the port.
Содержание Cross-8/HPoE-10G
Страница 1: ......
Страница 4: ......
Страница 9: ...19 4 2 Firmware Selection 350 ...
Страница 10: ...Revision History ...
Страница 85: ... Reset Click to undo any changes made locally and revert to previously saved values ...
Страница 111: ...Click to undo any changes made locally and revert to previously saved values ...
Страница 116: ...Click to undo any changes made locally and revert to previously saved values ...
Страница 150: ...Click to refresh the page immediately ...
Страница 295: ...Click to save changes Reset Click to undo any changes made locally and revert to previously saved values ...
Страница 301: ...Buttons Apply Click to save changes Reset Click to undo any changes made locally and revert to previously saved values ...