Configuring Port Security (J-Web Procedure)
To configure port security on the EX-series
switch using the J-Web interface:
- From the Configure menu select the
option Security > Port Security.
The first part of the screen displays a VLAN list with the VLAN
name, VLAN identifier, port members, and port security VLAN features.
The second part of the screen displays a list of
all ports and whether security features have been enabled on the ports.
- Click one:
Table 1: Port Security Settings on VLANs
Field
|
Function
|
Your Action
|
DHCP Snooping
|
Allows the switch to monitor and control DHCP messages
received from untrusted devices connected to the switch. Builds and
maintains a database of valid IP addresses/MAC address bindings. (By
default, access ports are untrusted and trunk ports are trusted.)
|
Select to enable DHCP snooping on a specified VLAN or
all VLANs.
|
ARP Inspection
|
Uses information in the DHCP snooping database to validate
ARP packets on the LAN and protect against ARP cache poisoning.
|
Select to enable ARP inspection on a specified VLAN or
all VLANs. (Configure any port on which you do not want ARP inspection
to occur as a trusted DHCP server port.)
|
MAC Movement
|
Prevents hosts whose MAC addresses have not been learned
by the switch from accessing the network. Specifies the number of
times per second that a MAC address can move to a new interface.
|
Enter the required number.
|
MAC Movement Action
|
Specifies the action to be taken if the MAC move limit
is exceeded.
|
Select one:
- Log—Generate a system log entry, an SNMP trap, or
an alarm.
- Drop—Drop the packets and generate a system log
entry, an SNMP trap, or an alarm.
- Shutdown—Block data traffic on the interface and
generate an alarm.
- None— No action to be taken.
|
Table 2: Port Security on Interfaces
Field
|
Function
|
Your Action
|
Trust DHCP
|
Specifies trusting DHCP packets on the selected interface.
By default trunk ports are dhcp-trusted.
|
Select to enable DHCP trust.
|
MAC Limit
|
Specifies the number of MAC addresses that can be learned
on a single Layer 2 access port. This option is not valid for trunk
ports.
|
Enter the required number.
|
MAC Limit Action
|
Specifies the action to be taken if the MAC limit is
exceeded. This option is not valid for trunk ports.
|
Select one:
- Log—Generate a system log entry, an SNMP trap, or
an alarm.
- Drop—Drop the packets and generate a system log
entry, an SNMP trap, or an alarm.
- Shutdown—Block data traffic on the interface and
generate an alarm.
- None— No action to be taken.
|
Allowed MAC List
|
Specifies the MAC addresses that are allowed for the
interface.
|
To add a MAC address:
- Click Add.
- Enter the MAC address.
- Click OK.
|