Displaying Port Security Configuration
129
Before continuing, make sure that:
■
Port security is enabled.
■
The maximum number of security MAC addresses allowed on the port is set.
■
The security mode of the port is set to
autolearn
.
Displaying Port
Security Configuration
After the above configuration, you can use the
display
command in any view to
display port security information and verify your configuration.
Port Security
Configuration
Example
Port Security
Configuration Example
Network requirements
Implement access user restrictions through the following configuration on
Ethernet1/0/1 of the switch.
■
Allow a maximum of 80 users to access the port without authentication and
permit the port to learn and add the MAC addresses of the users as security
MAC addresses.
■
To ensure that Host can access the network, add the MAC address
0001-0002-0003 of Host as a security MAC address to the port in VLAN 1.
■
After the number of security MAC addresses reaches 80, the port stops
learning MAC addresses. If any frame with an unknown MAC address arrives,
intrusion protection is triggered and the port will be disabled and stay silent for
30 seconds.
Table 86
Configure a security MAC address
Operation
Command
Remarks
Enter system view
system-view
-
Add a security
MAC address
In system
view
mac-address security
mac-address
interface
interface-type
interface-number
vlan
vlan-id
Either is required.
By default, no security MAC
address is configured.
In Ethernet
port view
interface
interface-type
interface-number
mac-address security
mac-address
vlan
vlan-id
Table 87
Display port security configuration
Operation
Command
Remarks
Display information about
port security configuration
display port-security
[
interface
interface-list
]
You can execute the
display
command in any view.
Display information about
security MAC address
configuration
display mac-address
security
[
interface
interface-type
interface-number
] [
vlan
vlan-id
] [
count
]
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...