Configuring Port Security (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER - NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3 Configuration Manual

Nsm configuration guide for ex series devices
Table of Contents

Advertisement

Table 23: Redundant Trunk Group Settings
Option
Function
Name
Specifies the name for the redundant trunk group.
Interface
Specifies the interface that must be part of the
redundant trunk group.

Configuring Port Security (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.
NOTE: After you make changes to a device configuration, you must push that
updated device configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See Updating
Devices for more information.
Ethernet LANs are vulnerable to attacks such as address spoofing and Layer 2 denial of
service (DoS) on network devices. Port security features such as DHCP snooping, DAI
(dynamic ARP inspection), MAC limiting, and MAC move limiting, as well as trusted DHCP
server, help protect the access ports on your switch against the losses of information
and productivity that can result from such attacks.
To configure port security:
In the navigation tree, select Device Manager > Devices. In Device Manager, select
1.
the device for which you want to configure port security.
In the Configuration tree, expand Ethernet Switching Options.
2.
Select Secure Access Port > Interface or VLAN.
4.
Click the Add icon.
5.
Add/modify settings for the interface as specified in Table 25 on page 38.
6.
Add/modify settings for the VLAN as specified in Table 24 on page 38.
NOTE: After you make changes to a device configuration, you must push that
updated device configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See Updating
Devices for more information.
Chapter 4: Configuring Ethernet Switching Options
Your Action
Enter the name.
1.
Select Interface.
2. Click Add.
3. Specify the interface.
4. Select Primary if the interface must be the primary
link.
5. Click OK.
37

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents