Dell 34XX Switch User Manual


 
Configuring Switch Information 237
Configuring Port Security
Network security can be enhanced by limiting access on a specific port only to users with specific
MAC addresses. The MAC addresses can be dynamically learned, up to that point, or they can be
statically configured. Locked port security monitors both received and learned packets that are
received on specific ports. Access to the locked port is limited to users with specific MAC addresses.
These addresses are either manually defined on the port, or learned on that port up to the point
when it is locked. When a packet is received on a locked port, and the packet’s source MAC address
is not tied to that port (either it was learned on a different port, or it is unknown to the system), the
protection mechanism is invoked, and can provide various options. Unauthorized packets arriving
to a locked port are either:
Forwarded
Discarded with no trap
Discarded with a trap
The port is shut down
Locked port security also enables storing a list of MAC addresses in the configuration file.
The MAC address list can be restored after the device has been reset.
NOTE: In order to enable port security, enable the Multiple Hosts feature on the required ports.
Disabled ports are activated from the
Port Security
page. The
Ports
page provides links for
configuring port functionality including advanced features such as storm control and port
mirroring, and for performing virtual port tests. To open the
Port Security
page, click
Switch
Network Security
Port Security
.