Configuring and monitoring port security, Basic operation, Basic operation -7 – SMC Networks SMC TigerStack II SMC6624M User Manual

Page 127

Advertising
background image

7-7

Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access

Configuring and Monitoring Port Security

Usi
n

g P
a

sswo

rds,
P

o

rt

S

ecu

ri

ty

, an
d A
u

th

or

iz

ed
I

P

Configuring and Monitoring Port
Security

Using Port Security, you can configure each switch port with a unique list of
the MAC addresses of devices that are authorized to access the network
through that port. This enables individual ports to detect, prevent, and log
attempts by unauthorized devices to communicate through the switch.

N o t e

This feature does not prevent intruders from receiving broadcast and multi-
cast traffic.

Basic Operation

Default Port Security Operation.

The default port security setting for

each port is off, or “continuous.” That is, any device can access a port without
causing a security reaction.

Intruder Protection.

A port that detects an “intruder” blocks the intruding

device from transmitting to the network through that port.

General Operation for Port Security.

On a per-port basis, you can

configure security measures to block unauthorized devices, and to send notice
of security violations. Once you have configured port security, you can then
monitor the network for security violations through one or more of the
following:

Alert flags that are captured by network management tools such as
EliteView

Alert Log entries in the switch’s web browser interface

Event Log entries in the console interface

Feature

Default

Menu

CLI

Web

Displaying Current Port Security

n/a

page 7-14

page 7-20

Configuring Port Security

disabled

page 7-15

page 7-20

Intrusion Alerts and Alert Flags

n/a

page 7-25

page 7-23

page 7-26

Advertising