Cisco SRW224G4P User Guide - Page 71

Port Security, Storm Control

Page 71 highlights

24-Port 10/100 + 2-Port Gigabit Switch with Webview and Power over Ethernet Port Security Port security is a feature that allows you to configure a switch port with one or more device MAC addresses that are authorized to access the network through that port. When port security is enabled on a port, the switch stops learning new MAC addresses on the specified port when it has reached a configured maximum number. Only incoming traffic with source addresses already stored in the dynamic or static address table will be accepted as authorized to access the network through that port. If a device with an unauthorized MAC address attempts to use the switch port, the intrusion will be detected and the switch can automatically take action by disabling the port and sending a trap message. To use port security, specify a maximum number of addresses to allow on the port and then let the switch dynamically learn the pair for frames received on the port. When the port has reached the maximum number of MAC addresses the selected port will stop learning. The MAC addresses already in the address table will be retained and will not age out. Any other device that attempts to use the port will be prevented from accessing the switch. Set the action to take when an invalid address is detected on a port, mark the checkbox in the Status column to enable security for a port, set the maximum number of MAC addresses allowed on a port. Click Submit to save the changes. Figure 5-47: Security - Port Security Storm Control You can protect your network from broadcast storms by setting a threshold for broadcast traffic for all ports. Any broadcast packets exceeding the specified threshold will then be dropped. Set the threshold using the Threshold text field, to enable storm control on a specified port mark the Enable checkbox for that port. storm control on a specified port. Click Submit to save the changes. Chapter 5: Configuring the Switch through the Web Utility Security Figure 5-48: Security - Storm Control 63

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104

63
Chapter 5: Configuring the Switch through the Web Utility
Security
24-Port 10/100 + 2-Port Gigabit Switch with Webview and Power over Ethernet
Port Security
Port security is a feature that allows you to configure a switch port with one or more device MAC addresses that
are authorized to access the network through that port. When port security is enabled on a port, the switch stops
learning new MAC addresses on the specified port when it has reached a configured maximum number. Only
incoming traffic with source addresses already stored in the dynamic or static address table will be accepted as
authorized to access the network through that port. If a device with an unauthorized MAC address attempts to
use the switch port, the intrusion will be detected and the switch can automatically take action by disabling the
port and sending a trap message.
To use port security, specify a maximum number of addresses to allow on the port and then let the switch
dynamically learn the <source MAC address, VLAN> pair for frames received on the port. When the port has
reached the maximum number of MAC addresses the selected port will stop learning. The MAC addresses
already in the address table will be retained and will not age out. Any other device that attempts to use the port
will be prevented from accessing the switch.
Set the action to take when an invalid address is detected on a port, mark the checkbox in the Status column to
enable security for a port, set the maximum number of MAC addresses allowed on a port.
Click
Submit
to save the changes.
Storm Control
You can protect your network from broadcast storms by setting a threshold for broadcast traffic for all ports. Any
broadcast packets exceeding the specified threshold will then be dropped.
Set the threshold using the Threshold text field, to enable storm control on a specified port mark the Enable
checkbox for that port. storm control on a specified port.
Click
Submit
to save the changes.
Figure 5-47: Security - Port Security
Figure 5-48: Security - Storm Control