Using the BayStack 410-24T 10BASE-T Switch

Table 3-6. MAC Address Table Screen Fields (continued)

Field

Description

 

 

 

Find an Address

Allows the user to search for a specific MAC address.

 

Default Value

00-00-00-00-00-00 (no MAC address assigned)

 

Range

00-00-00-00-00-00 to FF-FF-FF-FF-FF-FF

Port Mirroring Address A Only appears when any of the five address-basedmonitoring modes are selected from the Port Mirroring Configuration screen. When you enter a MAC address in this field, it is also configured into the Port Mirroring Configuration screen. Conversely, when you enter the MAC address from the Port Mirroring Configuration screen, it also appears in this screen. See “Port Mirroring Configuration” on page 3-64 for more information.

Default Value

00-00-00-00-00-00 (no MAC address assigned)

Range

00-00-00-00-00-00 to FF-FF-FF-FF-FF-FF

Port Mirroring Address B Only appears when any of the two address-basedmonitoring modes that use Address B are selected from the Port Mirroring Configuration screen. When you enter a MAC address in this field, it is also configured into the Port Mirroring Configuration screen. Conversely, when you enter the MAC address from the Port Mirroring Configuration screen, it also appears in this screen. See “Port Mirroring Configuration” on page 3-64 for more information.

Default Value

00-00-00-00-00-00 (no MAC address assigned)

Range

00-00-00-00-00-00 to FF-FF-FF-FF-FF-FF

 

 

MAC Address-Based Security

The MAC Address Security Configuration Menu screen (Figure 3-8) allows you to choose the appropriate screen to specify a range of system responses to unauthorized network access to your switch. The system response can range from sending a trap to disabling the port. The network access control is based on the MAC addresses of the authorized stations.

You can specify a list of up to 448 MAC addresses (within a single standalone switch or within one or more units in a single stacked configuration) that are authorized to access the switch or stack. You can also specify the ports that each MAC address is allowed to access.

The options for allowed port access include: NONE, ALL, and single or multiple ports that are specified in a list, for example, 1/1-4, 2/6, 3/9, etc., (see “Accelerator Keys for Repetitive Tasks” on page 3-33).

3-22

309985-B Rev 00

Page 160
Image 160
Nortel Networks 24T manual MAC Address-Based Security, Field Description Find an Address