- play_arrow Overview
- play_arrow Overview
- J-Web User Interface for EX Series Switches Overview
- J-Web Interface—Application Package
- Understanding J-Web User Interface Sessions
- Dashboard for EX Series Switches
- Understanding J-Web Configuration Tools
- Understand Alarm Types and Severity Levels on EX Series Switches
- Using the Commit Options to Commit Configuration Changes (J-Web Procedure)
-
- play_arrow Monitoring
- play_arrow Monitoring Tasks
- Check Active Alarms with the J-Web Interface
- Monitor System Log Messages
- Monitoring Chassis Information
- Monitoring System Properties
- Monitoring System Process Information
- Monitoring Switch Control Traffic
- Monitoring Interface Status and Traffic
- Monitoring PoE
- Monitoring Hosts Using the J-Web Ping Host Tool
- Monitoring Network Traffic Using Traceroute
- Monitoring DHCP Services
- Monitoring OSPF Routing Information
- Monitoring RIP Routing Information
- Monitoring BGP Routing Information
- Monitoring Routing Information
- Monitoring Ethernet Switching on EX Series Switches (J-Web)
- Monitoring IGMP Snooping
- Monitoring Spanning Tree Protocols on Switches
- Monitoring CoS Classifiers
- Monitoring CoS Drop Profiles
- Monitoring CoS Value Aliases
- Monitoring CoS Forwarding Classes
- Monitoring Interfaces That Have CoS Components
- Monitoring CoS Rewrite Rules
- Monitoring CoS Scheduler Maps
- Monitoring the Virtual Chassis Status and Statistics on EX Series Virtual Chassis
- Monitoring 802.1X Authentication
- Monitoring Port Security
-
- play_arrow Administration
- play_arrow Software, Files, Licenses, Logs
- Uploading a Configuration File (J-Web Procedure)
- Managing Configuration Files Through the Configuration History (J-Web Procedure)
- Setting or Deleting the Rescue Configuration (J-Web Procedure)
- Updating J-Web Interface on EX Series Switches (J-Web Procedure)
- Upgrading Junos OS on EX Series Switches (J-Web Procedure)
- Managing Licenses for the EX Series Switch (J-Web Procedure)
- Rebooting or Halting the EX Series Switch (J-Web Procedure)
- Managing Log, Temporary, and Crash Files on the Switch (J-Web Procedure)
- Registering the EX Series Switch with the J-Web Interface
- Generating Support Information Reports for EX Series Switches Using the J-Web Interface
-
- play_arrow Troubleshooting
- play_arrow Troubleshooting Task
- play_arrow FAQ
-
Configuring Port Security (J-Web Procedure)
This topic applies only to the J-Web Application package.
To configure port security on an EX Series switch using the J-Web interface:
Field | Function | Your Action |
---|---|---|
General tab | ||
Enable DHCP Snooping on VLAN | Allows the switch to monitor and control DHCP messages received from untrusted devices connected to the switch. Builds and maintains a database of valid IP addresses/MAC address bindings. (By default, access ports are untrusted and trunk ports are trusted.) | Select to enable DHCP snooping on a specified VLAN or all VLANs. Tip: For private VLANs (P-VLANs), enable DHCP snooping on the primary VLAN. If you enable DHCP snooping only on a community VLAN, DHCP messages coming from P-VLAN trunk ports are not snooped. |
Enable ARP Inspection on VLAN | Uses information in the DHCP snooping database to validate ARP packets on the LAN and protect against ARP cache poisoning. | Select to enable ARP inspection on a specified VLAN or all VLANs. (Configure any port on which you do not want ARP inspection to occur as a trusted DHCP server port.) |
MAC movement | Number of MAC movements allowed on the given VLAN. | Enter a number. The default is unlimited. |
MAC movement action | Specifies the action to be taken if the MAC movement limit is exceeded. | Select one of the following options:
|
Field | Function | Your Action |
---|---|---|
Trust DHCP | Specifies trusting DHCP packets on the selected interface. By default, trunk ports are dhcp-trusted. | Select to enable DHCP trust. |
MAC Limit | Specifies the number of MAC addresses that can be learned on a single Layer 2 access port. This option is not valid for trunk ports. | Enter a number. |
MAC Limit Action | Specifies the action to be taken if the MAC limit is exceeded. This option is not valid for trunk ports. | Select one of the following:
|
Allowed MAC List | Specifies the MAC addresses that are allowed for the interface. | To add a MAC address:
|