Netgear M5300-28G-POE+ (GSM7228PSv1h2) - 12-Port Managed Gigabit Switch Softwarehandbuch

Seite von 764
Manage Device Security 
598
M6100, M5300, and M7100 Series Managed Switches 
8. 
Select the Port Security Mode Disable or Enable radio button.
The Port Security Violations table shows information about violations that occurred on ports 
that are enabled for port security. The following table describes the fields in the Port Security 
Violations table.
Configure a Port Security Interface
A MAC address can be defined as allowable by one of two methods: dynamically or statically. 
Both methods are used concurrently when a port is locked.
Dynamic locking implements a first arrival mechanism for port security. You specify how 
many addresses can be learned on the locked port. If the limit was not reached, then a 
packet with an unknown source MAC address is learned and forwarded normally. When the 
limit is reached, no more addresses are learned on the port. Any packets with source MAC 
addresses that were not already learned are discarded. You can effectively disable dynamic 
locking by setting the number of allowable dynamic entries to zero.
Static locking allows you to specify a list of MAC addresses that are allowed on a port. The 
behavior of packets is the same as for dynamic locking: only packets with an allowable 
source MAC address can be forwarded.
To configure port security settings:
1. 
Prepare your computer with a static IP address in the 169.254.100.0 subnet, for 
example, 169.254.100.201.
2. 
Connect an Ethernet cable from an Ethernet port on your computer to an Ethernet port on 
the switch.
Table 217.  Port Security Violations
Field
Description
Port
The physical interface.
Last Violation MAC
The source MAC address of the last packet that was discarded at a 
locked port.
VLAN ID
The VLAN ID corresponding to the last violation MAC address.