Configuration Reference
Understanding Address Selections Methods
The technique used to control which devices are permitted to communicate
with a port is known as Address Selection. Address Selection is the process
by which the port sets policy for receiving packets. The port performs this
task by comparing addresses in the source header of a packet with preset
address tables that compile lists of acceptable source addresses. The address
tables can be very restrictive in allowing for packet reception or less restric-
tive. Address tables are determined by the Address Selection method you set
for the port. The three address selection methods are:
6-72
Continuous. The hub learns the address of the device attached to the
port and makes it the authorized address. If a different device is later
attached to the port, the new address is learned and becomes the autho-
rized address.
First Heard. The hub learns the address of the device attached to the
port and makes it the authorized address. If a different device is later
attached to the port, the new address is registered as an intruder address.
This indicates a security violation has occurred and the port is automati-
cally disabled.
Assigned. You enter the address of the device that is authorized to be
attached to the port. If a different device is later attached to the port, the
new address is registered as an intruder address. This indicates that a
security violation has occurred and the port is disabled. If you choose
Assigned, you need to go to the Authorized Address box and type in a
specific MAC address of a device authorized to be attached to that port.