Dell 3424P Computer Accessories User Manual


 
Configuring Switch Information 239
Action on Violation
— The action to be applied to packets arriving on a locked port. The possible
field values are:
Forward
— Forwards the packets from an unknown source, however, the MAC address is not
learned.
Discard
— Discards the packets from any unlearned source. This is the default value.
Shutdown
— Discards the packet from any unlearned source and shuts down the port. Ports
remained shut down until they are reactivated, or the device is reset.
Trap
— Enables traps being sent when a packet is received on a locked port.
Trap Frequency (1-1000000)
— The amount of time (in seconds) between traps. The default value
is 10 seconds.
Defining a Locked Port
1
Open the
Port Security
page.
2
Select an interface type and number.
3
Define the fields.
4
Click
Apply Changes
.
The locked port is added to the
Port Security Table
, and the device is updated.
Displaying the Port Security Table
1
Open the
Port Security
page.
2
Click
Show All.
The
Port Security Table
opens:
NOTE: Locked Ports are defined in the
Port Security Table
.
Figure 7-8. Port Security Table