User Manual

Table Of Contents
Insight Managed 8-Port Gigabit (Hi-Power) PoE+ Smart Cloud Switch with NETGEAR FlexPoE Power
Manage Switch Security User Manual312
4. Enter one of the following passwords:
After registration, enter your customized local device password.
If you previously added the switch to an Insight network location, enter the Insight
network password.
For more information about the local device password and the Insight network password,
see
Credentials for the local browser UI on page 28.
5. Click the Login button.
The System Information page displays.
6. Select Security > T
raffic Control > Port Security > Port Security Configuration.
The Port Security Configuration page displays.
7. T
o enable port security on the switch, select the Port Security Mode Enable radio button.
The default is Disable.
8. Click the Apply button.
Your settings are saved.
9. T
o refresh the page with the latest information about the switch, click the Refresh button.
The Port Security Violations table shows information about violations that occurred on ports
that are enabled for port security
.
The following table describes the fields in the Port Security Violations table.
Table 66. Port Security Violations information
Field Description
Port The physical interface.
Last Violation MAC The source MAC address of the last packet that was discarded at a locked port.
VLAN ID The VLAN ID corresponding to the last MAC address violation.
Configure a port security interface
A MAC address can be defined as allowable by one of two methods: dynamically or statically.
Both methods are used concurrently when a port is locked.
Dynamic locking implements a first arrival mechanism for port security. You specify how
many addresses can be learned on the locked port. If the limit was not reached, then a
packet with an unknown source MAC address is learned and forwarded normally. When the
limit is reached, no more addresses are learned on the port. Any packets with source MAC
addresses that were not already learned are discarded. You can effectively disable dynamic
locking by setting the number of allowable dynamic entries to zero.
Static locking allows you to specify a list of MAC addresses that are allowed on a port. The
behavior of packets is the same as for dynamic locking: only packets with an allowable
source MAC address can be forwarded.