Руководство По Обслуживанию для Cisco Cisco SG200-26P 26-port Gigabit PoE Smart Switch
Security
Port Security
Cisco Small Business SF200E Series Advanced Smart Switch
167
10
•
Rate Threshold—Specify the maximum rate at which this type of packet is
forwarded. If the Rate Threshold Type is Percent, enter a percentage of the
total port capability (0–100 percent). If the Rate Threshold Type is pps, enter
a packet per second rate (0–14880000). Ports that operate at 10 Mbps,
100 Mbps, or 1000 Mbps have a maximum throughput of 14880, pps
148800 pps, or 1488000 pps correspondingly.
forwarded. If the Rate Threshold Type is Percent, enter a percentage of the
total port capability (0–100 percent). If the Rate Threshold Type is pps, enter
a packet per second rate (0–14880000). Ports that operate at 10 Mbps,
100 Mbps, or 1000 Mbps have a maximum throughput of 14880, pps
148800 pps, or 1488000 pps correspondingly.
NOTE: The actual rate of ingress traffic required to activate Storm Control is
based on the actual size of incoming packets and the hard-coded average
packet size (512 bytes) parameter. A packet-per-second rate is calculated,
as the switch requires a pps value to execute or not execute storm control
versus an absolute data rate measured in kilobits-per-second (kbps). For
example, if the configured pps limit for broadcast packets is 10 percent, this
value is converted to approximately 20000 pps for a 100 Mbps port.
based on the actual size of incoming packets and the hard-coded average
packet size (512 bytes) parameter. A packet-per-second rate is calculated,
as the switch requires a pps value to execute or not execute storm control
versus an absolute data rate measured in kilobits-per-second (kbps). For
example, if the configured pps limit for broadcast packets is 10 percent, this
value is converted to approximately 20000 pps for a 100 Mbps port.
STEP 4
Click Apply and then click Close. Your changes are saved to the Running
Configuration.
Configuration.
Port Security
You can enable port security on a per-port basis. When a port is secured (locked),
the switch forwards only those packets with a source MAC address that is
secured at the port. All other packets are discarded. This includes discarding any
packet from a port with a source MAC address that is secured at another port.
the switch forwards only those packets with a source MAC address that is
secured at the port. All other packets are discarded. This includes discarding any
packet from a port with a source MAC address that is secured at another port.
A secure MAC address can be statically configured or dynamically learned. The
maximum number of secure MAC addresses at a secured port is 256. Static
secure MAC addresses are configured using the Static Addresses page. Both
static and dynamic secure MAC addresses are subject to aging limits (see
maximum number of secure MAC addresses at a secured port is 256. Static
secure MAC addresses are configured using the Static Addresses page. Both
static and dynamic secure MAC addresses are subject to aging limits (see
To display the Port Security page, click Security > Port Security in the navigation
window.
window.
The Port Security Table shows the current security configuration for each port.
You can select LAG from the Interface Type list to display data for LAGs only. By
default, port security is disabled globally and on each interface.
You can select LAG from the Interface Type list to display data for LAGs only. By
default, port security is disabled globally and on each interface.