Preparing For Configurations; Default Configurations Of Port Security Mac - Raisecom ISCOM2600G-HI (A) Series Configuration Manual

Table of Contents

Advertisement

Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
Processing mode for violating port security MAC
When the number of secure MAC addresses has already reached the maximum number,
inputting of packets from a strange source MAC address will be regarded as a violation
operation. For the illegal user access, there are different processing modes for configuring the
switch according to secure MAC violation policy:
When the MAC address is flapping, in other words, secure interface A is accessed by
a user corresponding to a secure MAC address that is already on secure interface B,
secure interface A will process the access as violation.

10.2.2 Preparing for configurations

Scenario
To ensure the security of data accessed by the interface of the switch, you can control the
incoming packets according to source MAC address. With port security MAC, you can
configure the feature of permitting specified users to access the interface, or permitting
specified number of users to access from this interface only. However, when the number of
users exceeds the limit, the accessed packets will be processed in accordance with port
security MAC violation policies.
Prerequisite
N/A

10.2.3 Default configurations of port security MAC

Default configurations of port security MAC are as below.
Interface secure MAC
Aging time of dynamic secure MAC address
When sticky learning is enabled, all dynamic secure MAC addresses learnt from
an interface will be converted to sticky secure MAC addresses.
When sticky learning is disabled, all sticky secure MAC addresses on an interface
will be converted to dynamic secure MAC addresses.
Protect mode: for illegal access users, the secure interface will discard the user's packets
directly.
Restrict mode: for illegal access users, the secure interface will discard the user's packets,
and the console will print Syslog information and send an alarm to the NMS.
Shutdown mode: for illegal access users, the secure interface will discard the user's
packets, and the console will print Syslog information, send an alarm to the NMS, and
then shut down the secure interface.
Function
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
Default value
Disable
300s
10 Security
404

Advertisement

Table of Contents
loading

Table of Contents