D-Link DMS-3130 User Manual - Page 335
Port Security Address Entries
View all D-Link DMS-3130 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 335 highlights
DMS-3130 Series Multi-Gigabit L3 Stackable Managed Switch Web UI Reference Guide Parameter Description • Selecting Inactivity specifies that the secure addresses on this port age out only if there is no data traffic from the secure source address for the specified time period. Click the Apply button to accept the changes made. Port Security Address Entries This window is used to view, clear and configure the port security address entries. To view the following window, click Security > Port Security > Port Security Address Entries, as shown below: Figure 9-3 Port Security Address Entries Window The fields that can be configured are described below: Parameter Unit Port MAC Address VID Description Select the Switch unit that will be used for this configuration here. This option is only available if stacking is enabled. Select the appropriate port range used for the configuration here. Enter the MAC address here. Select the Permanent option to specify that all learned MAC addresses will not be purged out unless the user manually deletes those entries. Enter the VLAN ID here. This value must be between 1 and 4094. Click the Add button to add a new entry based on the information entered. Click the Delete button to remove a new entry based on the information entered. Click the Clear by Port button to clear the information based on the port selected. Click the Clear by MAC button to clear the information based on the MAC address entered. Click the Clear All button to clear all the information in this table. Enter a page number and click the Go button to navigate to a specific page when multiple pages exist. 802.1X 802.1X (Port-based and Host-based Access Control) The IEEE 802.1X standard is a security measure for authorizing and authenticating users to gain access to various wired or wireless devices on a specified Local Area Network by using a Client and Server based access control model. This is accomplished by using a RADIUS server to authenticate users trying to access a network by relaying Extensible Authentication Protocol over LAN (EAPOL) packets between the Client and the Server. 324