GS716Tv2 and GS724Tv3 Software Administration Manual
The following table describes the fields on the Port Summary page.
Field | Description | |
Port | The port whose settings are displayed in the current table row. | |
|
| |
Control Mode | Defines the port authorization state. The control mode is only set if the link | |
| status of the port is link up. The possible field values are: | |
| • Auto: Automatically detects the mode of the interface. | |
| • Force Authorized: Places the interface into an authorized state without | |
|
| being authenticated. The interface sends and receives normal traffic |
|
| without client |
| • Force Unauthorized: Denies the selected interface system access by | |
|
| moving the interface into unauthorized state. The switch cannot provide |
|
| authentication services to the client through the interface. |
|
| |
Operating Control Mode | This field indicates the control mode under which the port is actually | |
| operating. Possible values are: | |
| • | ForceUnauthorized |
| • | ForceAuthorized |
| • | Auto |
| • N/A: If the port is in detached state it cannot participate in port access | |
|
| control. |
Reauthentication Enabled | Displays if reauthentication is enabled on the selected port. This is a | |
| configurable field. The possible values are true and false. If the value is true, | |
| reauthentication will occur. Otherwise, reauthentication will not be allowed. | |
|
| |
Port Status | This field displays the authorization status of the specified port. The possible | |
| values are Authorized, Unauthorized, and N/A. If the port is in detached | |
| state, the value will be N/A since the port cannot participate in port access | |
| control. | |
|
|
|
Click Refresh to update the information on the screen.
Traffic Control
From the Traffic Control link, you can configure MAC Filters, Storm Control, Port Security, and Protected Port settings. To display the page, click the Security > Traffic Control tab.
The Traffic Control folder contains links to the following features:
•MAC Filter:
•MAC Filter Configuration on page 175
•MAC Filter Summary on page 176
•Storm Control on page 177
•Port Security:
•Port Security Configuration on page 178
•Port Security Interface Configuration on page 179
174 Chapter 5: Managing Device Security