
296
Aging Period
If Aging Enabled is checked, then the aging period is controlled with this input. If
other modules are using the underlying port security for securing MAC
addresses, they may have other requirements to the aging period. The
underlying port security will use the shorter requested aging period of all modules
that use the functionality.
The Aging Period can be set to a number between 10 and 10,000,000 seconds.
To understand why aging may be desired, consider the following scenario:
Suppose an end-host is connected to a 3rd party switch or hub, which in turn is
connected to a port on this switch on which Limit Control is enabled. The
end-host will be allowed to forward if the limit is not exceeded. Now suppose that
the end-host logs off or powers down. If it wasn't for aging, the end-host would
still take up resources on this switch and will be allowed to forward. To overcome
this situation, enable aging. With aging enabled, a timer is started once the
end-host gets secured. When the timer expires, the switch starts looking for
frames from the end-host, and if such frames are not seen within the next Aging
Period, the end-host is assumed to be disconnected, and the corresponding
resources are freed on the switch.
Port Configuration
The table has one row for each port on the selected switch in the stack and a number of columns, which are:
Object
Description
Port
The port number for which the configuration below applies.
Mode
Controls whether Limit Control is enabled on this port. Both this and the Global
Mode must be set to Enabled for Limit Control to be in effect. Notice that other
modules may still use the underlying port security features without enabling Limit
Control on a given port.
Limit
The maximum number of MAC addresses that can be secured on this port. This
number cannot exceed 1024. If the limit is exceeded, the corresponding action is
taken.
The switch is "born" with a total number of MAC addresses from which all ports
draw whenever a new MAC address is seen on a Port Security-enabled port.
Since all ports draw from the same pool, it may happen that a configured
maximum cannot be granted, if the remaining ports have already used all
Содержание NS3702-24P-4S
Страница 1: ...NS3702 24P 4S User Manual P N 1072832 REV 00 01 ISS 14JUL14 ...
Страница 65: ...65 Buttons Click to apply changes Click to undo any changes made locally and revert to previously saved values ...
Страница 102: ...102 Figure 4 5 4 LACP Port Configuration Page Screenshot ...
Страница 119: ...119 Figure 4 6 4 VLAN Membership Status for Static User Page Screenshot ...
Страница 124: ...124 Figure 4 6 6 Private VLAN Membership Configuration page screenshot ...
Страница 135: ...135 VLAN 3 Port 3 Port 6 The screen in Figure 4 6 18 appears Figure 4 6 17 Private VLAN Port Setting ...
Страница 140: ...140 Figure 4 6 21 Group Name to VLAN Mapping Table Page Screenshot ...
Страница 164: ...164 Figure 4 8 2 Multicast Flooding ...
Страница 184: ...184 Figure 4 8 15 MLD Snooping Port Group Filtering Configuration Page Screenshot ...
Страница 204: ...204 Figure 4 9 6 QoS Egress Port Tag Remarking Page Screenshot ...
Страница 209: ...209 QoS Class QoS Class value can be any of 0 7 DPL Drop Precedence Level 0 1 ...
Страница 251: ...251 Figure 4 11 3 Authentication Method Configuration Page Screenshot ...
Страница 286: ...286 Figure 4 11 11 RADIUS Server Configuration Screenshot ...
Страница 290: ...290 Figure 4 11 17 Add User Properties Screen Figure 4 11 18 Add User Properties Screen ...
Страница 298: ...298 non committed changes will be lost ...
Страница 349: ...349 Figure 4 16 2 PoE Configuration Screenshot ...
Страница 355: ...355 Figure 4 16 5 PoE Status Screenshot ...