User guide
Table Of Contents
- Contents
- Figures
- Tables
- Preface
- Section I
- Basic Operations
- Chapter 1
- Basic Switch Parameters
- Configuring the Switch’s Name, Location, and Contact
- Changing the Manager and Operator Passwords
- Setting the System Date and Time
- Rebooting a Switch
- Pinging a Remote System
- Returning the AT-S63 Management Software to the Factory Default Values
- Displaying the IP Address of the Local Interface
- Displaying System Information
- Chapter 2
- Port Parameters
- Chapter 3
- Enhanced Stacking
- Chapter 4
- SNMPv1 and SNMPv2c
- Chapter 5
- MAC Address Table
- Chapter 6
- Static Port Trunks
- Chapter 7
- Port Mirroring
- Section II
- Advanced Operations
- Chapter 8
- File System
- Chapter 9
- File Downloads and Uploads
- Chapter 10
- Event Logs and Syslog Client
- Chapter 11
- Classifiers
- Chapter 12
- Access Control Lists
- Chapter 13
- Class of Service
- Chapter 14
- Quality of Service
- Chapter 15
- Denial of Service Defenses
- Chapter 16
- IGMP Snooping
- Section III
- SNMPv3
- Chapter 17
- SNMPv3
- Configuring the SNMPv3 Protocol
- Enabling or Disabling SNMP Management
- Configuring the SNMPv3 User Table
- Configuring the SNMPv3 View Table
- Configuring the SNMPv3 Access Table
- Configuring the SNMPv3 SecurityToGroup Table
- Configuring the SNMPv3 Notify Table
- Configuring the SNMPv3 Target Address Table
- Configuring the SNMPv3 Target Parameters Table
- Configuring the SNMPv3 Community Table
- Displaying SNMPv3 Tables
- Section IV
- Spanning Tree Protocols
- Chapter 18
- Spanning Tree and Rapid Spanning Tree Protocols
- Chapter 19
- Multiple Spanning Tree Protocol
- Section V
- Virtual LANs
- Chapter 20
- Port-based and Tagged VLANs
- Chapter 21
- GARP VLAN Registration Protocol
- Section VI
- Port Security
- Chapter 22
- MAC Address-based Port Security
- Chapter 23
- 802.1x Port-based Network Access Control
- Section VII
- Management Security
- Chapter 24
- Encryption Keys, PKI, and SSL
- Chapter 25
- Secure Shell (SSH)
- Chapter 26
- TACACS+ and RADIUS Protocols
- Chapter 27
- Management Access Control List
- Index

Chapter 22: MAC Address-based Port Security
352 Section VI: Port Security
The Security for Ports page displays a table that contains the following
columns of information:
Port
The number of the port.
Security Mode
The active security mode on the port. The possible settings are
Automatic, Limited, Secured, and Locked.
Intruder Action
The column specifies the action taken by the switch if a port receives
an invalid packet. The possible settings are:
Discard - The port discards invalid packets. This is the default.
Trap - The port discards invalid packets and sends a trap. This action
applies only to the Limited security mode.
Trap/Disable - The port discards invalid packets, sends a trap, and
disables the port. This action applies only to the Limited security mode.
Note
The Participating and MAC Limit parameters only apply the Limited
security level.
Participating
This column only applies when the intrusion action for a port is set to
trap or disable. This option does not apply when intrusion action is set
to No Action (discard). If this option is set to No when intrusion action
is set to trap or disable, the port discards invalid packets, but it does
not send a trap or disable the port.
MAC Limit
This column specifies the maximum number of dynamic MAC
addresses the port learns.