SMC Networks SMC6624M Switch User Manual


 
7-7
Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access
Configuring and Monitoring Port Security
Using Passwords, Port
Security, and Authorized IP
Configuring and Monitoring Port
Security
Using Port Security, you can configure each switch port with a unique list of
the MAC addresses of devices that are authorized to access the network
through that port. This enables individual ports to detect, prevent, and log
attempts by unauthorized devices to communicate through the switch.
Note This feature does not prevent intruders from receiving broadcast and multi-
cast traffic.
Basic Operation
Default Port Security Operation. The default port security setting for
each port is off, or “continuous.” That is, any device can access a port without
causing a security reaction.
Intruder Protection. A port that detects an “intruder” blocks the intruding
device from transmitting to the network through that port.
General Operation for Port Security. On a per-port basis, you can
configure security measures to block unauthorized devices, and to send notice
of security violations. Once you have configured port security, you can then
monitor the network for security violations through one or more of the
following:
Alert flags that are captured by network management tools such as
EliteView
Alert Log entries in the switch’s web browser interface
Event Log entries in the console interface
Feature Default Menu CLI Web
Displaying Current Port Security n/a page 7-14 page 7-20
Configuring Port Security disabled page 7-15 page 7-20
Intrusion Alerts and Alert Flags n/a page 7-25 page 7-23 page 7-26