Juniper EX Series User Manual page 103

J-web application package
Hide thumbs Also See for EX Series:
Table of Contents

Advertisement

Table 46: Port Security on Interfaces (continued)
Field
Function
MAC Limit Action
Specifies the action to be taken if the MAC
limit is exceeded. This option is not valid for
trunk ports.
Allowed MAC List
Specifies the MAC addresses that are
allowed for the interface.
Related
Documentation
Copyright © 2017, Juniper Networks, Inc.
Configuring Port Security (CLI Procedure)
Example: Configuring Basic Port Security Features
Monitoring Port Security on page 237
Understanding Port Security Features to Protect the Access Ports on Your Device Against
the Loss of Information and Productivity
Chapter 6: Security and Management Configuration
Your Action
Select one of the following:
—Generate a system log entry, an SNMP trap, or an
log
alarm.
—Drop the packets and generate a system log
drop
entry, an SNMP trap, or an alarm. (Default)
—Shut down the interface and generate an
shutdown
alarm. You can mitigate the effect of this option by
configuring autorecovery from the disabled state and
specifying a
disable timeout
Autorecovery From the Disabled State on Secure or
Storm Control Interfaces (CLI Procedure)
—Take no action.
none
EX4300 switches have an additional option:
—Drop the packet and generate an alarm,
drop-and-log
an SNMP trap, or a system log entry.
To add a MAC address:
1.
Click
Add
.
2. Enter the MAC address.
3. Click
.
OK
value. See Configuring
83

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents