Port Security; Port Configuration - ASUSTeK COMPUTER GigaX3112 Series User Manual

Layer 3 managed switch
Table of Contents

Advertisement

4.9.4 Port Security

The switch also supports port security feature. It enables a systemʼs
administrator to control who can connect to their network. You can use the
port security feature to restrict input to an interface by limiting and identifying
MAC addressed of the stations allowed to access the port. When you assign
secure MAC addresses to a secure port, the port does not forward with source
addresses outside the group of defined addresses. This decreases the possibility
that a non-authorized device can use our network for malicious purposes.
4.9.4.1
Port Configuration
The page is used to configure port security configuration.
First, you must select a port by clicking it from the following table. Then, begin to
set the port configuration. Please click when youʼre done with the modifications:
Admin: Enable or disable port security feature.
Violation Mode: It decides the port behavior when security violation
happens. If "Shutdown" is selected, the port becomes blocking state and
system logs a syslog message, and increments the violation counter. If
"Restrict" is selected, a syslog message is logged, and the violation counter
increments. If "Protect" is selected, you are not notified that a security
violation has occurred.
Max MAC Address: The maximum numbers of secure MAC addresses on
this port. It is between 1 and 132 and the total number in the system is 1024.
GigaX3112 Series Layer 3 Managed Switch
Figure 62. RADIUS
57

Advertisement

Table of Contents
loading

Table of Contents