F
M
RONT
ATTER
8.8 Port Security
Use the
Port Security
sub-menu to restrict input to an interface by restricting connections by source MAC address.
8.8.1 Limit Control
Use
Limit Control
to configure how MAC addresses are restricted on a port-by-port basis.
To configure a System Configuration of Limit Control
1. Click
Security
>
Port Security
2. Configure the parameters.
3. Click Save.
Parameter description
System Configuration
Mode:
Indicates if Limit Control is globally enabled or disabled on the switch stack. If globally disabled, other modules may still use the underlying
functionality, but limit checks and corresponding actions are disabled.
Aging Enabled:
If checked, secured MAC addresses are subject to aging as discussed under Aging Period.
Aging Period:
If Aging Enabled is checked, then the aging period is controlled with this input. If other modules are using the underlying port security for
securing MAC addresses, they may have other requirements to the aging period. The underlying port security will use the shorter requested
aging period of all modules that use the functionality.
The Aging Period can be set to a number between 10 and 10,000,000 seconds.
MGS3600-24F/XGS3600-26F/XGS3600-28F
>
Limit
Control.
8-33
U
'
G
SER
S
UIDE