Netgear GS716Tv2 GS716Tv2/GS724Tv3 Software Admin Manual - Page 160

Port Security Configuration, Go To Interface, Apply, Security, Traffic Control, Port Security

Page 160 highlights

GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-22. Storm Control Fields Field Ingress Control Mode Threshold Description Select the mode of broadcast affected by storm control. • Disable - Do not use storm control. • Unknown Unicast - If the rate of unknown L2 unicast (destination lookup failure) traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. • Multicast - If the rate of L2 multicast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. • Broadcast - If the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. Specifies the maximum rate at which unknown packets are forwarded. The range is a percent of the total threshold. The range is a percent of the total threshold between 0-100%. The default is 5%. Table 5-23. Port Settings Fields Field Description Port Status Threshold Select the check box next to the port to change the Storm Control administrative status. Shows whether the interfaces is enabled for storm control. If the port check box is selected, you can enable or disable storm control for the port. Used to set the threshold for either Broadcast, Multicast, or Unknown Unicast traffic. The range is between 0-100% 2. To go to an interface in the list, type the interface number in the Go To Interface field and click Go. 3. If you make changes to the page, click Apply to apply the changes to the system. Port Security Configuration Use the Port Security feature to lock one or more ports on the system. When a port is locked, only packets with allowable source MAC addresses can be forwarded. All other packets are discarded. To display the Port Security Configuration page: 1. Click Security  Traffic Control, and then click the Port Security  Port Security Configuration link. 5-34 v1.0, July 2009 Managing Device Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

GS716Tv2 and GS724Tv3 Software Administration Manual
5-34
Managing Device Security
v1.0, July 2009
2.
To go to an interface in the list, type the interface number in the
Go To Interface
field and
click
Go
.
3.
If you make changes to the page, click
Apply
to apply the changes to the system.
Port Security Configuration
Use the Port Security feature to lock one or more ports on the system. When a port is locked, only
packets with allowable source MAC addresses can be forwarded. All other packets are discarded.
To display the Port Security Configuration page:
1.
Click
Security
Traffic Control
, and then click the
Port Security
Port Security
Configuration
link.
Table
5-22. Storm Control Fields
Field
Description
Ingress Control
Mode
Select the mode of broadcast affected by storm control.
Disable — Do not use storm control.
Unknown Unicast — If the rate of unknown L2 unicast (destination lookup
failure) traffic ingressing on an interface increases beyond the configured
threshold, the traffic will be dropped.
Multicast — If the rate of L2 multicast traffic ingressing on an interface
increases beyond the configured threshold, the traffic will be dropped.
Broadcast — If the rate of L2 broadcast traffic ingressing on an interface
increases beyond the configured threshold, the traffic will be dropped.
Threshold
Specifies the maximum rate at which unknown packets are forwarded. The
range is a percent of the total threshold. The range is a percent of the total
threshold between 0–100%. The default is 5%.
Table
5-23. Port Settings Fields
Field
Description
Port
Select the check box next to the port to change the Storm Control
administrative status.
Status
Shows whether the interfaces is enabled for storm control. If the port check box
is selected, you can enable or disable storm control for the port.
Threshold
Used to set the threshold for either Broadcast, Multicast, or Unknown Unicast
traffic. The range is between 0–100%