Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
10 Security
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
404
When sticky learning is enabled, all dynamic secure MAC addresses learnt from
an interface will be converted to sticky secure MAC addresses.
When sticky learning is disabled, all sticky secure MAC addresses on an interface
will be converted to dynamic secure MAC addresses.
Processing mode for violating port security MAC
When the number of secure MAC addresses has already reached the maximum number,
inputting of packets from a strange source MAC address will be regarded as a violation
operation. For the illegal user access, there are different processing modes for configuring the
switch according to secure MAC violation policy:
Protect mode: for illegal access users, the secure interface will discard the user's packets
directly.
Restrict mode: for illegal access users, the secure interface will discard the user's packets,
and the console will print Syslog information and send an alarm to the NMS.
Shutdown mode: for illegal access users, the secure interface will discard the user's
packets, and the console will print Syslog information, send an alarm to the NMS, and
then shut down the secure interface.
When the MAC address is flapping, in other words, secure interface A is accessed by
a user corresponding to a secure MAC address that is already on secure interface B,
secure interface A will process the access as violation.
10.2.2 Preparing for configurations
Scenario
To ensure the security of data accessed by the interface of the switch, you can control the
incoming packets according to source MAC address. With port security MAC, you can
configure the feature of permitting specified users to access the interface, or permitting
specified number of users to access from this interface only. However, when the number of
users exceeds the limit, the accessed packets will be processed in accordance with port
security MAC violation policies.
Prerequisite
N/A
10.2.3 Default configurations of port security MAC
Default configurations of port security MAC are as below.
Function
Default value
Interface secure MAC
Disable
Aging time of dynamic secure MAC address
300s