User's Manual

Table Of Contents
188
Users Manual of CS-6306R
11.1.3 Configuring the Storm Control on the Port
The ports of the switch may receives the attack by the continuous abnormal unicast (MAC address lookup
failing), multicast or broadcast message. In this case, the attacked ports or the whole switch may break down.
The storm control mechanism of the port is therefore generated.
Command Purpose
storm-control {broadcast | multicast |
unicast} threshold count
Performs the storm control to the
broadcast/multicast/unicast message.
no storm-control {broadcast |
multicast | unicast} threshold
Cancels the storm control.
Secure Port Configuration 11.2
11.2.1 Overview
You can control the access function of the secure port, enabling the port to run in a certain range according to
your configuration. If you enable the security function of a port through configuring the number of secure MAC
addresses for the port. If the number of secure MAC addresses exceeds the upper limitation and MAC
addresses are insecure, secure port violation occurs. You should take actions according to different violation
modes.
The secure port has the following functions:
Configuring the number of secure MAC addresses
Configuring static secure MAC addresses
If the secure port has no static secure MAC address or the number of static secure MAC addresses is
smaller than that of secure MAC addresses, the port will learn dynamic MAC addresses.
Dropping violated packets when secure port violation occurs
The section describes how to configure the secure port for the switch.
11.2.2 Configuration Task of the Secure Port
Configuring Secure Port Mode
Configuring the Static MAC Address of the Secure Port