Chapter 4 - configuration management – Asus GigaX1024iPlus User Manual

Page 45

Advertising
background image

36

Chapter 4 - Configuration Management

ASUS GigaX 1024i+

Port: Select the port to make the

configuration.

Admin: Disable/enable port

security feature on the port.

Violation Mode: Set the violation

mode. This action will be taken

when a violation occurs. It is a

security violation when one of these

situations occurs:
1) It is a security violation when the maximum numbers of secure MAC

addresses have been added to the address table, and a station whose

MAC addresses is not in the address table attempts to access the

interface.
2) An address learned or configured on one secure interface is seen

on another secure interface in the same VLAN. You can configure the

interface for one of the three violation modes:

a)

Protect: In this mode, you are not notified that a security violation has

occurred.

b)

Restrict: In this mode, you are notified that a security violation has

occurred. Specifically, an SNMP trap is sent, a syslog message is

logged, and the violation counter increments.

c)

Shutdown: In this mode, a port security violation causes the interface

to become blocking state immediately. It also sends an SNMP trap,

logs a syslog message, and increments the violation counter.

Max MAC Addresses: Set the maximum numbers of secure MAC

addresses. The valid value is from 1 to 132. The sum of this value for all

ports is less than or equal to the maximum number of secure MAC address

allowed in the switch.

Aging Time: Set the aging time. The valid value is from 0 to 1440(mins).

The aging mechanism is only effective for dynamic secure MAC

addresses. If the time is 0, the aging mechanism is disabled for this port.

Aging Type: Set the aging type to determine the action when the

dynamic secure MAC addresses are aged out. Two types of aging are

supported for each port:

a)

Absolute: the secure addresses on the port are deleted after the

specified aging time.

b)

Inactivity: the secure addresses on the port are deleted only if there

Figure 38. Port Configuration

Advertising