Specifications
8-12 Rapier Switch Software Reference
Software Release 2.7.3
C613-03098-00 REV A
addresses on a locked port. To disable port security on a port, set the limit for
learned MAC addresses to zero or none. Port security can be enabled or
disabled on a port by using the command:
set switch port={port-list|all} learn={none|0|1..256}
[intrusionaction={discard|trap|disable}]
If intrusionaction is set to trap or disable, a list of MAC addresses for devices
that are active on a port, but which are not allowed or learned for the port, can
be displayed (Figure 8-46 on page 8-228) by using the command:
show switch port={port-list|all} intrusion
A switch port can be manually locked before it reaches the learning limit by
using the command:
activate switch port={port-list|all} lock
Addresses can be manually added to a port locked list up to a total of 256 MAC
addresses, and the learning limit can be extended to accommodate them. Use
the command:
add switch filter action={forward|discard} destaddress=macadd
port=port [entry=entry] [learn] [vlan={vlan-name|1..4094}]
Learned addresses on locked ports can be saved as part of the switch
configuration, so that they become part of the configuration after a power
cycle. Use the command:
create config=filename
If the configuration is not saved when there is a locked list for a port, the
learning process begins again after the switch is restarted.
Virtual Local Area Networks (VLANs)
A Virtual LAN (VLAN) is a logical, software-defined subnetwork. It allows
similar devices on the network to be grouped together into one broadcast
domain, irrespective of their physical position in the network. Multiple VLANs
can be used to group workstations, servers, stacks, and other network
equipment connected to the switch, according to similar data and security
requirements.
Decoupling logical broadcast domains from the physical wiring topology
offers several advantages, including the ability to:
■ Move devices and people with minimal, or no, reconfiguration
■ Change a device’s broadcast domain and access to resources without
physically moving the device, by software reconfiguration or by moving its
cable from one switch port to another
■ Isolate parts of the network from other parts by placing them in different
VLANs
■ Share servers and other network resources without losing data isolation or
security
■ Direct broadcast traffic to only those devices that need to receive it thereby
reducing traffic across the network