It can also be used to maintain a secure MAC address table in addition to the one provided by the switch. This feature can be used to limit the number of MAC addresses on the ports.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |