14-17
Configuring and Monitoring Port Security
Port Security
Retention of Static Addresses
Static MAC addresses do not age-out. MAC addresses learned by using
learn-
mode continuous
or
learn-mode limited-continuous
age out according to the
currently configured MAC age time. (For information on the
mac-age-time
command, refer to the chapter titled
“Interface Access and System Informa-
tion” in the
Basic Operation Guide
for your switch.
Learned Addresses.
In the following two cases, a port in Static learn mode
retains a learned MAC address even if you later reboot the switch or disable
port security for that port:
■
The port learns a MAC address after you configure the port for Static learn
mode in both the startup-config file and the running-config file (by exe-
cuting the
write memory
command).
■
The port learns a MAC address after you configure the port for Static learn
mode in only the running-config file and, after the address is learned, you
execute
write memory
to configure the startup-config file to match the
running-config file.
To remove an address learned using either of the preceding methods, do one
of the following:
■
Delete the address by using
no port-security <
port-number
> mac-address
<
mac-addr
>
.
■
Download a configuration file that does not include the unwanted MAC
address assignment.
■
Reset the switch to its factory-default configuration.
Syntax:
port-security
(Continued)
clear-intrusion-flag
Clears the intrusion flag for a specific port. (See “Reading
Intrusion Alerts and Resetting Alert Flags” on page
no port-security
<port-list>
mac-address <
mac-addr
> [
<mac-addr>
<mac-addr>
]
Removes the specified learned MAC address(es) from the
specified port.
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......