60
Chapter 5: Using the Web-based Utility for Configuration
Security Tab - Port Security
WebView Switches
Server Timeout. Specifies the number of seconds that lapses before the switch resends a request to the
authentication server (Range: 1-65535). The field default is 30 seconds.
Security Tab - Port Security
Network security can be increased by limiting access on a specific port only to users with specific MAC
addresses. MAC addresses can be dynamically learned or statically configured. Locked port security monitors
both received and learned packets that are received on specific ports. Access to the locked port is limited to
users with specific MAC addresses. These addresses are either manually defined on the port, or learned on that
port up to the point when it is locked. When a packet is received on a locked port, and the packet source MAC
address is not tied to that port (either it was learned on a different port, or it is unknown to the system), the
protection mechanism is invoked, and can provide various options. Unauthorized packets arriving at a locked port
are either:
• Forwarded
• Discarded with no trap
• Discarded with a trap
• Cause the port to be shut down.
Locked port security also enables storing a list of MAC addresses in the configuration file. The MAC address list
can be restored after the device has been reset.
Disabled ports are activated from the Port Security page.
Interface. Displays the port or LAG name.
Lock Interface. Selecting this option locks the specified interface.
Learning Mode. Defines the locked port type. The Learning Mode field is enabled only if Locked is selected in the
Interface Status field.The possible field values are:
• Classic Lock. Locks the port using the classic lock mechanism. The port is immediately locked,
regardless of the number of addresses that have already been learned.
• Limited Dynamic Lock. Locks the port by deleting the current dynamic MAC addresses associated with
the port. The port learns up to the maximum addresses allowed on the port. Both relearning and aging
MAC addresses are enabled.
Figure 5-32: Security - Port Security