Netgear GS716Tv2 GS716Tv2/GS724Tv3 Software Admin Manual - Page 156

Traffic Control, MAC Filter Configuration

Page 156 highlights

GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-19. Port Summary Fields (continued) Field Reauthentication Enabled Port Status Description Displays if reauthentication is enabled on the selected port. This is a configurable field. The possible values are 'true' and 'false'. If the value is 'true' reauthentication will occur. Otherwise, reauthentication will not be allowed. This field shows the authorization status of the specified port. The possible values are 'Authorized', 'Unauthorized' and 'N/A'. If the port is in detached state, the value will be 'N/A' since the port cannot participate in port access control. 2. Click Refresh to update the information on the screen. Traffic Control From the Traffic Control page, you can configure MAC Filters, Storm Control, Port Security, and Protected Port settings. To display the page, click the Security  Traffic Control tab. The Traffic Control folder contains links to the following features: • MAC Filter: • "MAC Filter Configuration" on page 5-30 • "MAC Filter Summary" on page 5-32 • "Storm Control" on page 5-33 • Port Security: • "Port Security Configuration" on page 5-34 • "Port Security Interface Configuration" on page 5-35 • "Security MAC Address" on page 5-37 • "Protected Ports Membership" on page 5-38 MAC Filter Configuration Use the MAC Filter Configuration page to create MAC filters that limit the traffic allowed into and out of specified ports on the system. To display the MAC Filter Configuration page: 5-30 v1.0, July 2009 Managing Device Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

GS716Tv2 and GS724Tv3 Software Administration Manual
5-30
Managing Device Security
v1.0, July 2009
2.
Click
Refresh
to update the information on the screen.
Traffic Control
From the
Traffic Control
page, you can configure MAC Filters, Storm Control, Port Security, and
Protected Port settings. To display the page, click the
Security
Traffic Control
tab.
The Traffic Control folder contains links to the following features:
MAC Filter:
“MAC Filter Configuration” on page
5-30
“MAC Filter Summary” on page
5-32
“Storm Control” on page
5-33
Port Security:
“Port Security Configuration” on page
5-34
“Port Security Interface Configuration” on page
5-35
“Security MAC Address” on page
5-37
“Protected Ports Membership” on page
5-38
MAC Filter Configuration
Use the MAC Filter Configuration page to create MAC filters that limit the traffic allowed into and
out of specified ports on the system.
To display the MAC Filter Configuration page:
Reauthentication Enabled
Displays if reauthentication is enabled on the selected port. This is a
configurable field. The possible values are 'true' and 'false'. If the value
is 'true' reauthentication will occur. Otherwise, reauthentication will not
be allowed.
Port Status
This field shows the authorization status of the specified port. The
possible values are 'Authorized', 'Unauthorized' and 'N/A'. If the port is
in detached state, the value will be 'N/A' since the port cannot
participate in port access control.
Table
5-19. Port Summary Fields (continued)
Field
Description