Section 10
Security
Traffic Control
Port Security Port Lock Entries 802.1X Trusted Host Traffic Segmentation
SSH
The following section will aid the user in configuring security functions for the Switch. The Switch includes various functions for security, including Traffic Control, Port Security, Port Lock Entries, 802.1X, Trusted Host, Traffic Segmentation and SSH all discussed in detail in the following section.
Traffic Control
On a computer network, packets such as Multicast packets and Broadcast packets continually flood the network as normal procedure. At times, this traffic may increase do to a malicious end station on the network or a malfunctioning device, such as a faulty network card. Thus, switch throughput problems will arise and consequently affect the overall performance of the switch network. To help rectify this packet storm, the Switch will monitor and control the situation.
The packet storm is monitored to determine if too many packets are flooding the network, based on the threshold level provided by the user. Once a packet storm has been detected, the Switch will drop packets coming into the Switch until the storm has subsided. This method can be utilized by selecting the Drop option of the Action field in the window below.
133