Tp-Link TL-SG2008 [38/153] Port security
![Tp-Link TL-SG2008 [38/153] Port security](/views2/1210231/page38/bg26.png)
31
Note:
1. The LAG member can not be selected as the mirrored port or mirroring port.
2. A port can not be set as the mirrored port and the mirroring port simultaneously.
3. The Port Mirror function can take effect span the multiple VLANs.
5.1.3 Port Security
MAC Address Table maintains the mapping relationship between the port and the MAC address of
the connected device, which is the base of the packet forwarding. The capacity of MAC Address
Table is fixed. MAC Address Attack is the attack method that the attacker takes to obtain the
network information illegally. The attacker uses tools to generate the cheating MAC address and
quickly occupy the MAC Address Table. When the MAC Address Table is full, the switch will
broadcast the packets to all the ports. At this moment, the attacker can obtain the network
information via various sniffers and attacks. When the MAC Address Table is full, the packets
traffic will flood to all the ports, which results in overload, lower speed, packets drop and even
breakdown of the system.
Port Security is to protect the switch from the malicious MAC Address Attack by limiting the
maximum number of MAC addresses that can be learned on the port. The port with Port Security
feature enabled will learn the MAC address dynamically. When the learned MAC address number
reaches the maximum, the port will stop learning. Thereafter, the other devices with the MAC
address unlearned can not access to the network via this port.
Choose the menu Switching→Port→Port Security to load the following page.
Figure 5-4 Port Security
The following entries are displayed on this screen:
¾ Port Security
Select: Select the desired port for Port Security configuration. It is
multi-optional.
Port: Displays the port number.
Содержание
- Port gigabit smart switch 1
- Tl sg2008 1
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety information 3
- Package contents 8
- Chapter 1 about this guide 9
- Conventions 9
- Intended readers 9
- Overview of this guide 9
- Appearance description 12
- Chapter 2 introduction 12
- Front panel 12
- Main features 12
- Overview of the switch 12
- Rear panel 13
- Chapter 3 login to the switch 14
- Configuration 14
- Chapter 4 system 16
- System info 16
- System summary 16
- Device description 17
- System time 18
- Daylight saving time 19
- System ip 20
- User management 21
- User table 21
- User config 22
- Config restore 23
- System tools 23
- Config backup 24
- Firmware upgrade 24
- System reboot 25
- System reset 25
- Access control 26
- Access security 26
- Ssl config 27
- Ssh config 29
- Application example 1 for ssh 30
- Application example 2 for ssh 31
- Chapter 5 switching 35
- Port config 35
- Port mirror 36
- Port security 38
- Port isolation 39
- Loopback detection 40
- Lag table 42
- Static lag 43
- Lacp config 44
- Traffic monitor 46
- Traffic summary 46
- Traffic statistics 47
- Mac address 48
- Address table 49
- Static address 50
- Dynamic address 51
- Filtering address 53
- Dhcp filtering 54
- Chapter 6 vlan 58
- Q vlan 59
- Vlan config 60
- Application example for 802 q vlan 62
- Chapter 7 spanning tree 64
- Stp config 69
- Port config 71
- Stp summary 71
- Instance config 73
- Mstp instance 73
- Region config 73
- Instance port config 75
- Global configuration procedure for spanning tree function 76
- Port protect 76
- Stp security 76
- Tc protect 78
- Application example for stp function 79
- Chapter 8 multicast 83
- Igmp snooping 85
- Snooping config 86
- Port config 87
- Vlan config 88
- Configuration procedure 89
- Multicast vlan 89
- Application example for multicast vlan 91
- Configuration procedure 91
- Multicast ip 92
- Multicast ip table 92
- Static multicast ip 93
- Multicast filter 94
- Ip range 95
- Port filter 95
- Configuration procedure 97
- Packet statistics 97
- Chapter 9 qos 99
- Diffserv 102
- Port priority 102
- Configuration procedure 103
- P cos mapping 103
- Dscp priority 104
- Schedule mode 105
- Bandwidth control 106
- Rate limit 106
- Storm control 107
- Voice vlan 108
- Global config 110
- Port config 111
- Oui config 112
- Configuration procedure of voice vlan 113
- Acl config 114
- Acl create 114
- Acl summary 114
- Chapter 10 acl 114
- Mac acl 115
- Extend ip acl 116
- Standard ip acl 116
- Policy config 117
- Policy summary 117
- Action create 118
- Policy create 118
- Binding table 119
- Policy binding 119
- Port binding 120
- Vlan binding 120
- Application example for acl 121
- Configuration procedure 121
- Chapter 11 snmp 124
- Global config 126
- Snmp config 126
- Snmp group 127
- Snmp view 127
- Snmp user 129
- Snmp community 131
- Configuration procedure 132
- Notification 133
- History control 135
- Alarm config 136
- Event config 136
- Chapter 12 maintenance 139
- Cpu monitor 139
- System monitor 139
- Memory monitor 140
- Log table 141
- Local log 142
- Backup log 143
- Remote log 143
- Cable test 144
- Device diagnostics 144
- Loopback 145
- Network diagnostics 145
- Tracert 146
- Appendix a specifications 148
- Appendix b configuring the pcs 149
- Appendix c glossary 151
Похожие устройства
- Tp-Link T1700X-16TS Руководство по командной строке
- Tp-Link T1700X-16TS Руководство по установке
- Tp-Link T1700X-16TS Руководство пользователя
- Tp-Link T1700G-28TQ Руководство по командной строке
- Tp-Link T1700G-28TQ Руководство по установке
- Tp-Link T1700G-28TQ Руководство пользователя
- Tp-Link TL-SG2210P Брошюра
- Tp-Link TL-SG2210P Руководство по командной строке
- Tp-Link TL-SG2210P Руководство по установке
- Tp-Link TL-SG2210P Руководство пользователя
- Tp-Link TL-SG2452 Брошюра
- Tp-Link TL-SG2452 Руководство по командной строке
- Tp-Link TL-SG2452 Руководство по установке
- Tp-Link TL-SG2452 Руководство пользователя
- Tp-Link TL-SL2210 Брошюра
- Tp-Link TL-SL2210 Руководство по командной строке
- Tp-Link TL-SL2210 Руководство по установке
- Tp-Link TL-SL2210 Руководство пользователя
- Tp-Link TL-SL2452 Брошюра
- Tp-Link TL-SL2452 Руководство по командной строке
Скачать
Случайные обсуждения