Protection from unauthorized access
6.4.2 Defining port access control
V Select the Security:Port Security dialog.
V First select, whether you wish the MAC based or the IP based port
security.
V If you have selected MAC based you enter in the "Allowed MAC
addresses" column the the MAC addresses of the devices with which
a data exchange at this port is permitted. You can enter up to 10 MAC
addresses each ot these seperated with a space character. Without
entry, reception from all devices is allowed.
D
The "Current MAC address" column shows the MAC address of the
device from which data was last received. By pressing the left mouse
button, you can copy an entry from the "Current MAC address"
column into the "Allowed MAC address" column.
V If you selected IP based, enter in the column "Allowed IP addesses"
the IP addresses of the devices, with which data exchange at this
port is allowed. You can enter up to 10 IP addresses each ot these
seperated with a space character. Without entry, reception from all
devices is allowed.
V In the "Action" column you select whether an unauthorized access at-
tempt should be followed by
– no action (none) or
– the sending of an alarm (trapOnly) or
– switching off the port by making a corresponding entry in the port
configuration table (see
an alarm (trap) (portDisable).
Basic - L3P
Release 3.1 06/07
"Configuring ports" on page
6.4 Port access control
69) and sending
85