463
Configuring Port-Based Traffic Control
Additional References
Switch(config-if)#
switchport port-security violation restrict
Switch(config-if)#
switchport port-security mac-address sticky
Switch(config-if)#
switchport port-security mac-address sticky 0000.0000.0002
Switch(config-if)#
switchport port-security mac-address 0000.0000.0003
Switch(config-if)#
switchport port-security mac-address sticky 0000.0000.0001 vlan voice
Switch(config-if)#
switchport port-security mac-address 0000.0000.0004 vlan voice
Switch(config-if)#
switchport port-security maximum 10 vlan access
Switch(config-if)#
switchport port-security maximum 10 vlan voice
Configuring Port Security Aging: Examples
This example shows how to set the aging time as 2 hours for the secure addresses on a port:
Switch(config)#
interface GigabitEthernet1/17
Switch(config-if)#
switchport port-security aging time 120
This example shows how to set the aging time as 2 minutes for the inactivity aging type with aging enabled for the
configured secure addresses on the interface:
Switch(config-if)#
switchport port-security aging time 2
Switch(config-if)#
switchport port-security aging type inactivity
Switch(config-if)#
switchport port-security aging static
You can verify the previous commands by entering the
show port-security interface
interface-id
privileged EXEC
command.
Configuring Protocol Storm Protection: Example
This example shows how to configure protocol storm protection to drop incoming DHCP traffic on DHCP when it exceeds
35 packets per second:
Switch#
configure terminal
Switch(config)#
psp dhcp pps 35
Additional References
The following sections provide references related to switch administration:
Summary of Contents for IE 4000
Page 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Page 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Page 108: ...104 Configuring Switch Clusters Additional References ...
Page 128: ...124 Performing Switch Administration Additional References ...
Page 130: ...126 Configuring PTP ...
Page 140: ...136 Configuring CIP Additional References ...
Page 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Page 192: ...188 Configuring Switch Based Authentication Additional References ...
Page 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Page 298: ...294 Configuring VLANs Additional References ...
Page 336: ...332 Configuring STP Additional References ...
Page 408: ...404 Configuring DHCP Additional References ...
Page 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Page 490: ...486 Configuring SPAN and RSPAN Additional References ...
Page 502: ...498 Configuring Layer 2 NAT ...
Page 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Page 930: ...926 Configuring IP Unicast Routing Related Documents ...
Page 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Page 978: ...974 Dying Gasp ...
Page 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Page 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Page 996: ...992 Ethernet CFM ...
Page 1066: ...1062 Using an SD Card SD Card Alarms ...