Netgear GS110TP GS108Tv2/GS110TP Software Reference Manual - Page 206

Port Security Interface Configuration, Port Security Mode, Cancel, Apply, Refresh, Security

Page 206 highlights

GS108T and GS110TP Smart Switch Software Administration Manual To configure the global port security mode: 1. In the Port Security Mode field, select the appropriate radio button to enable or disable port security on the switch. 2. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 3. If you change the mode, click Apply to apply the change to the system. The Port Security Violation table shows information about violations that occurred on ports that are enabled for port security. The following table describes the fields in the Port Security Violation table. Table 5-6. Port Security Violation Fields Field Description Port Identifies the port where a violation occurred. Last Violation MAC Displays the source MAC address of the last packet that was discarded at a locked port. VLAN ID Displays the VLAN ID corresponding to the Last Violation MAC address. Click Refresh to refresh the page with the most current data from the switch. Port Security Interface Configuration A MAC address can be defined as allowable by one of two methods: dynamically or statically. Both methods are used concurrently when a port is locked. Dynamic locking implements a first arrival mechanism for Port Security. You specify how many addresses can be learned on the locked port. If the limit has not been reached, then a packet with an unknown source MAC address is learned and forwarded normally. When the limit is reached, no more addresses are learned on the port. Any packets with source MAC addresses that were not already learned are discarded. You can effectively disable dynamic locking by setting the number of allowable dynamic entries to zero. Static locking allows you to specify a list of MAC addresses that are allowed on a port. The behavior of packets is the same as for dynamic locking: only packets with an allowable source MAC address can be forwarded. To display the Port Security Interface Configuration page, click Security  Traffic Control, and then click the Port Security  Interface Configuration link. 5-38 v1.0, April 2010 Managing Device Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

GS108T and GS110TP Smart Switch Software Administration Manual
5-38
Managing Device Security
v1.0, April 2010
To configure the global port security mode:
1.
In the
Port Security Mode
field, select the appropriate radio button to enable or disable port
security on the switch.
2.
Click
Cancel
to cancel the configuration on the screen and reset the data on the screen to the
latest value of the switch.
3.
If you change the mode, click
Apply
to apply the change to the system.
The Port Security Violation table shows information about violations that occurred on ports that
are enabled for port security. The following table describes the fields in the Port Security Violation
table.
Click
Refresh
to refresh the page with the most current data from the switch.
Port Security Interface Configuration
A MAC address can be defined as allowable by one of two methods: dynamically or statically.
Both methods are used concurrently when a port is locked.
Dynamic locking implements a first arrival mechanism for Port Security. You specify how many
addresses can be learned on the locked port. If the limit has not been reached, then a packet with an
unknown source MAC address is learned and forwarded normally. When the limit is reached, no
more addresses are learned on the port. Any packets with source MAC addresses that were not
already learned are discarded. You can effectively disable dynamic locking by setting the number
of allowable dynamic entries to zero.
Static locking allows you to specify a list of MAC addresses that are allowed on a port. The
behavior of packets is the same as for dynamic locking: only packets with an allowable source
MAC address can be forwarded.
To display the Port Security Interface Configuration page, click
Security
Traffic Control
, and
then click the
Port Security
Interface Configuration
link.
Table
5-6.
Port Security Violation Fields
Field
Description
Port
Identifies the port where a violation occurred.
Last Violation MAC
Displays the source MAC address of the last packet that was discarded at a
locked port.
VLAN ID
Displays the VLAN ID corresponding to the Last Violation MAC address.