Configuring Port Security
Network security can be enhanced by limiting access on a specific port only to users with specific MAC addresses. The MAC addresses can be dynamically learned, up to that point, or they can be statically configured. Locked port security monitors both received and learned packets that are received on specific ports. Access to the locked port is limited to users with specific MAC addresses.
These addresses are either manually defined on the port, or learned on that port up to the point when it is locked. When a packet is received on a locked port, and the packet’s source MAC address is not tied to that port (either it was learned on a different port, or it is unknown to the system), the protection mechanism is invoked, and can provide various options. Unauthorized packets arriving to a locked port are either:
•Forwarded
•Discarded with no trap
•Discarded with a trap
•The port is shut down
Locked port security also enables storing a list of MAC addresses in the configuration file. The MAC address list can be restored after the device has been reset.
In order to enable port security, enable the Multiple Hosts feature on the required ports.
Disabled ports are activated from the Port Security page. The Ports page provides links for configuring port functionality including advanced features such as storm control and port mirroring, and for performing virtual port tests.
To open the Port Security page, click Switch → Network Security → Port Security.
Figure 7-7. Port Security
Configuring Switch Information
273