4 port security, 1 port configuration – Asus GigaX2024B User Manual

Page 60

Advertising
background image

48

GigaX2024B L2 Managed Switch User Manual

4.8.4 Port security

The switch also supports port security feature. It enables a systemʼs

administrator to control who can connect to their network. You can use the

port security feature to restrict input to an interface by limiting and identifying

MAC addressed of the stations allowed to access the port. When you assign

secure MAC addresses to a secure port, the port does not forward with source

addresses outside the group of defined addresses. This decreases the possibility

that a non-authorized device can use our network for malicious purposes.

4.8.4.1 Port configuration

The page is used to configure port security configuration.
First, you must select a port by clicking it from the following table. Then, begin

to set the port configuration. Please click

Modify when youʼre done with the

modifications:

a) Admin: Enable or disable port security feature.
b) Violation Mode: It decides the port behavior when security violation happens.

If “Shutdown” is selected, the port becomes blocking state and system

logs a syslog message, and increments the violation counter. If “Restrict” is

selected, a syslog message is logged, and the violation counter increments.

If “Protect” is selected, you are not notified that a security violation has

occurred.

c) Max MAC Address: The maximum numbers of secure MAC addresses on

this port. It is between 1 and 132 and the total number in the system is 1024.

d) Aging Time: The aging time for this port. After the expiration of the time, the

corresponding dynamic secure MAC address will be removed from secure

MAC address table. The valid range is 0 to 1440(mins). If the time is equal

to 0, the aging mechanism is disabled for this port.

e) Aging Type: The aging type determines the action when the secure MAC

addresses are aged out. If “Absolute” is selected, the secure addresses on

the port are deleted after the specified aging time. If “Inactivity” is selected,

the secure addresses in the port are deleted only if there is no data traffic

from the secure source MAC address for the specified time period.

Click

OK to make the settings permanent. Click Reload to refresh the settings to

current value.

Advertising