Juniper NETWORK AND SECURITY MANAGER - NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3 Configuration Manual page 54

Nsm configuration guide for ex series devices
Table of Contents

Advertisement

Table 24: Port Security Settings on VLANs
Option
Function
Name
Specifies the VLAN.
DHCP Snooping
Allows the switch to monitor and control DHCP
messages received from untrusted devices connected
to the switch. Builds and maintains a database of valid
IP addresses/MAC address bindings. (By default,
access ports are untrusted and trunk ports are trusted.)
ARP Inspection
Uses information in the DHCP snooping database to
validate ARP packets on the LAN and protect against
ARP cache poisoning.
MAC Move Limit
Prevents hosts whose MAC addresses have not been
learned by the switch from accessing the network.
Specifies the number of times per second that a MAC
address can move to a new interface.
MAC Movement
Specifies the action to be taken if the MAC move limit
Action
is exceeded.
Table 25: Port Security on Interfaces
Option
Function
Interface
Specifies trusting DHCP packets on the selected
interface. By default trunk ports are
Allowed MAC List
Specifies the MAC addresses that are allowed for
the interface.
MAC Limit
Specifies the number of MAC addresses that can be
learned on a single Layer 2 access port. This option
is not valid for trunk ports.
38
Your Action
Enter the VLAN name.
Select to enable DHCP snooping on a specified
VLAN or all VLANs.
Select to enable ARP inspection on a specified
VLAN or all VLANs. (Configure any port on which
you do not want ARP inspection to occur as a
trusted DHCP server port.)
Select the MAC Move Limit Option. Select the
required number.
Select one:
Log—Generate a system log entry, an SNMP
trap, or an alarm.
Drop—Drop the packets and generate a system
log entry, an SNMP trap, or an alarm.
Shutdown—Block data traffic on the interface
and generate an alarm.
None— No action to be taken.
Your Action
Select to enable DHCP trust.
.
dhcp-trusted
To add a MAC address:
1.
Click
Add
2. Enter the MAC address.
3. Click
OK
Enter the required number.
.
.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER - NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager

Table of Contents