55-23
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 55 Configuring Port Security
Configuring Port Security on Voice Ports
Configuring Port Security on Voice Ports
To configure port security on a voice port, perform this task:
Command
Purpose
Step 1
Switch(config)#
interface
interface_id
Enters interface configuration mode and specifies the
physical interface to configure.
Step 2
Switch(config-if)#
switchport mode access
Sets the interface mode.
Note
An interface in the default mode (dynamic auto)
cannot be configured as a secure port.
Step 3
Switch(config-if)# [
no
]
switchport port-security
Enables port security on the interface.
To return the interface to the default condition as not
secured, use the
no switchport port-security
command.
Step 4
Switch(config-if)# [
no
]
switchport port-security
violation
{
restrict
|
shutdown
}
(Optional) Sets the violation mode, the action to be taken
when a security violation is detected, as one of these:
•
restrict
—A port security violation restricts data and
causes the SecurityViolation counter to increment
and send an SNMP trap notification.
•
shutdown
—The interface is error-disabled when a
security violation occurs.
Note
When a secure port is in the error-disabled state,
you can bring it out of this state by entering the
errdisable recovery cause
psecure-violation
global configuration command or you can
manually reenable it by entering the
shutdown
and
no shut down
interface configuration
commands.
To return the violation mode to the default condition
(shutdown mode), use the
no
switchport port-security
violation shutdown
command.
Step 5
Switch(config-if)#
switchport port-security limit
rate invalid-source-mac
packets_per_sec
Sets the rate limit for bad packets.
Default is 10 pps.
Summary of Contents for Catalyst 4500 Series
Page 2: ......
Page 4: ......
Page 2086: ...Index IN 46 Software Configuration Guide Release IOS XE 3 9 0E and IOS 15 2 5 E ...