GS716Tv2 and GS724Tv3 Software Administration Manual
3.If you change the mode, click Apply to apply the change to the system.
The Port Security Violation table shows information about violations that occurred on ports that are enabled for port security. The following table describes the fields in the Port Security Violation table.
Field | Description |
Port | Identifies the port where a violation occurred. |
|
|
Last Violation MAC | Displays the source MAC address of the last packet that was discarded at a |
| locked port. |
|
|
VLAN ID | Displays the VLAN ID corresponding to the Last Violation MAC address. |
|
|
Click Refresh to refresh the page with the most current data from the switch.
Port Security Interface Configuration
A MAC address can be defined as allowable by one of two methods: dynamically or statically. Both methods are used concurrently when a port is locked.
Dynamic locking implements a first arrival mechanism for Port Security. You specify how many addresses can be learned on the locked port. If the limit has not been reached, then a packet with an unknown source MAC address is learned and forwarded normally. When the limit is reached, no more addresses are learned on the port. Any packets with source MAC addresses that were not already learned are discarded. You can effectively disable dynamic locking by setting the number of allowable dynamic entries to zero.
Static locking allows you to specify a list of MAC addresses that are allowed on a port. The behavior of packets is the same as for dynamic locking: only packets with an allowable source MAC address can be forwarded.
To display the Port Security Interface Configuration page, click Security > Traffic Control, and then click the Port Security > Interface Configuration link.
Chapter 5: Managing Device Security 179