Illegal Access Processing Policy
Unauthorized access processing policies include:
- Default processing policy
- Conflict processing policy
- IP-MAC mismatch processing policy
Operation Procedure
- Click the Resource tab, and then click Access Configuration from the navigation tree to enter the access configuration management page.
- Click the Unauthorized Access Processing Policy link to enter the unauthorized access processing policy page.
- Specify relevant parameters.
- Click OK.
Precautions
- When some devices in the network are not added to the system, the learned access interface of the endpoint may not be the interface directly connected to the endpoint. Shutting down the interface might lead to a large area of disconnection.