Managing MAC Address Table
Example for Security Configurations
Configuration Guide
147
4
Example for Security Configurations
4.1 Network Requirements
Several departments are connected to the company network as shown in Figure 4-1. Now
the Marketing Department that is in VLAN 10 has network requirements as follows:
Free the network system from illegal accesses and MAC address attacks by limiting the
number of access users in this department to 100.
Assist the network manager supervising the network with notifications of any new
access users.
Figure 4-1
The Network Topology
Gi1/0/1
Gi1/0/3
Gi1/0/2
R&D Department
VLAN 30
Marketing Department
VLAN 10
Switch
......
Internet
4.2 Configuration Scheme
VLAN Security can be configured to limit the number of access users and in this way to
prevent illegal accesses and MAC address attacks.
MAC Notification and SNMP can be configured to monitor the interface which is used by
the Marketing Department. Enable the new-MAC-learned notification and the SNMP, then
the network manager can get notifications when new users access the network.
Demonstrated with T1600G-52TS, this chapter provides configuration procedures in two
ways: using the GUI and using the CLI.
Содержание TL-SG2424
Страница 26: ...Part 1 Accessing the Switch CHAPTERS 1 Overview 2 Web Interface Access 3 Command Line Interface Access...
Страница 130: ...Part 4 Configuring LAG CHAPTERS 1 LAG 2 LAG Configuration 3 Configuration Example 4 Appendix Default Parameters...
Страница 147: ...Part 5 Monitoring Traffic CHAPTERS 1 Traffic Monitor 2 Appendix Default Parameters...
Страница 449: ...Part 15 Configuring ARP CHAPTERS 1 Overview 2 ARP Configurations...
Страница 508: ...Configuring Voice VLAN Configuration Guide 485...
Страница 768: ...Configuring SNMP RMON Appendix Default Parameters Configuration Guide 745 Parameter Default Setting Status Disable...