Configuring Port Security

Network security can be enhanced by limiting access on a specific port only to users with specific MAC addresses. The MAC addresses can be dynamically learned, up to that point, or they can be statically configured. Locked port security monitors both received and learned packets that are received on specific ports. Access to the locked port is limited to users with specific MAC addresses.

These addresses are either manually defined on the port, or learned on that port up to the point when it is locked. When a packet is received on a locked port, and the packet’s source MAC address is not tied to that port (either it was learned on a different port, or it is unknown to the system), the protection mechanism is invoked, and can provide various options. Unauthorized packets arriving to a locked port are either:

Forwarded

Discarded with no trap

Discarded with a trap

The port is shut down

Locked port security also enables storing a list of MAC addresses in the configuration file. The MAC address list can be restored after the device has been reset.

In order to enable port security, enable the Multiple Hosts feature on the required ports.

Disabled ports are activated from the Port Security page. The Ports page provides links for configuring port functionality including advanced features such as storm control and port mirroring, and for performing virtual port tests.

To open the Port Security page, click Switch Network Security Port Security.

Figure 7-7. Port Security

Configuring Switch Information

273

Page 273
Image 273
Dell 3548 manual Configuring Port Security, Port Security Configuring Switch Information