D-Link DGS-3130 User Manual - Page 256

Security Mode

Page 256 highlights

DGS-3130 Series Layer 3 Stackable Managed Switch Web UI Reference Guide Figure 9-2 Port Security Port Settings Window The fields that can be configured are described below: Parameter Unit From Port - To Port State Maximum Violation Action Description Select the Switch unit that will be used for this configuration here. Select the appropriate port range used for the configuration here. Select to enable or disable the port security feature on the port(s) specified. Enter the maximum number of secure MAC addresses that will be allowed on the port(s) specified. This value must be between 0 and 12288. By default, this value is 32. Select the violation action that will be taken here. Options to choose from are Protect, Restrict, and Shutdown.  Selecting Protect specifies to drop all packets from the insecure hosts at the port-security process level, but does not increment the securityviolation count.  Selecting Restrict specifies to drop all packets from the insecure hosts at the port-security process level and increments the security-violation count and record the system log.  Selecting Shutdown specifies to shut down the port if there is a security violation and record the system log. Security Mode Select the security mode option here. Options to choose from are Permanent and Delete-on-Timeout.  Selecting Permanent specifies that under this mode, all learned MAC addresses will not be purged out unless the user manually deletes those entries.  Selecting Delete-on-Timeout specifies that under this mode, all learned MAC addresses will be purged out when an entry is aged out or when the user manually deletes these entries. Aging Time Aging Type Enter the aging time value used for auto-learned dynamic secured addresses on the specified port here. This value must be between 0 and 1440 minutes. Select the aging type here. Options to choose from are Absolute and Inactivity.  Selecting Absolute specifies that all the secure addresses on this port age out exactly after the time specified and is removed from the secure address list. This is the default type. 246

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410

DGS-3130 Series Layer 3 Stackable Managed Switch Web UI Reference Guide
246
Figure 9-2 Port Security Port Settings Window
The fields that can be configured are described below:
Parameter
Description
Unit
Select the Switch unit that will be used for this configuration here.
From Port - To Port
Select the appropriate port range used for the configuration here.
State
Select to enable or disable the port security feature on the port(s) specified.
Maximum
Enter the maximum number of secure MAC addresses that will be allowed on
the port(s) specified. This value must be between 0 and 12288. By default, this
value is 32.
Violation Action
Select the violation action that will be taken here. Options to choose from are
Protect
,
Restrict
, and
Shutdown
.
Selecting
Protect
specifies to drop all packets from the insecure hosts at
the port-security process level, but does not increment the security-
violation count.
Selecting
Restrict
specifies to drop all packets from the insecure hosts at
the port-security process level and increments the security-violation count
and record the system log.
Selecting
Shutdown
specifies to shut down the port if there is a security
violation and record the system log.
Security Mode
Select the security mode option here. Options to choose from are
Permanent
and
Delete-on-Timeout
.
Selecting
Permanent
specifies that under this mode, all learned MAC
addresses will not be purged out unless the user manually deletes those
entries.
Selecting
Delete-on-Timeout
specifies that under this mode, all learned
MAC addresses will be purged out when an entry is aged out or when the
user manually deletes these entries.
Aging Time
Enter the aging time value used for auto-learned dynamic secured addresses
on the specified port here. This value must be between 0 and 1440 minutes.
Aging Type
Select the aging type here. Options to choose from are
Absolute
and
Inactivity
.
Selecting
Absolute
specifies that all the secure addresses on this port age
out exactly after the time specified and is removed from the secure
address list. This is the default type.