25 PORT SECURITY CONFIGURATIONn Currently, A type modules (3C16860, 3C16860, 3C16861, 3C16861, LS81FS24A,LS81FS24, 3C16858, 3C16858, 3C16859, and 3C16859) do not support the portsecurity feature.Port SecurityOverviewIntroduction Port security is a security mechanism for network access control. It is an expansionto the current 802.1x and MAC address authentication.Port security defines various security modes that allow devices to learn legal sourceMAC addresses, in order for you to implement different network securitymanagement as needed. With port security, packets whose source MAC addressescannot be learned by your switch in a security mode are considered illegal packets,and 802.1x authentication failure events and MAC authentication failure eventsare considered illegal events.Upon detecting an illegal packet or illegal event, the system triggers thecorresponding port security features and takes pre-defined actions automatically.This reduces your maintenance workload and greatly enhances system securityand manageability.Port Security Features The following port security features are provided:1 NTK (need to know) feature: By checking the destination MAC addresses inoutbound data frames on a port, NTK ensures that only successfully authenticateddevices can obtain data frames from the port, thus preventing illegal devices fromintercepting network data.2 Intrusion protection feature: By checking the source MAC addresses in inbounddata frames or the username and password in 802.1x authentication requests on aport, intrusion protection detects illegal packets (packets with illegal MAC address)or events and takes a pre-set action accordingly. The actions you can set include:disconnecting the port temporarily/permanently, and blocking packets with invalidMAC addresses.3 Device tracking feature: When special data packets (generated from illegalintrusion, abnormal login/logout or other special activities) are passing through aswitch port, device tracking enables the switch to send Trap messages to help thenetwork administrator monitor special activities.Port Security Modes Table 129 describes the available port security modes: