9-10
Configuring and Monitoring Port Security
Port Security Command Options and Operation
Retention of Static MAC Addresses
Learned MAC Addresses
In the following two cases, a port in Static learn mode (
learn-mode static
)
retains a learned MAC address even if you later reboot the switch or disable
port security for that port:
■
The port learns a MAC address after you configure the port with l
earn-
mode static
in both the startup-config file and the running-config file
(by executing
write memory
).
■
The port learns a MAC address after you configure the port with
learn-
mode static
in only the running-config file and, after the address is
learned, you execute
write memory
to configure the startup-config file
to match the running-config file.
Assigned/Authorized MAC Addresses
If you manually assign a MAC address (using
mac-address <
mac-addr
>
) and
then execute
write memory
, the assigned MAC address remains in memory
unless removed by one of the methods described below.
Removing Learned and Assigned Static MAC Addresses
To remove a static MAC address, do one of the following:
■
Delete the address by using
no port-security <
port-number
> mac-
address <
mac-addr
>
.
■
Download a configuration file that does not include the unwanted
MAC address assignment.
■
Reset the switch to its factory-default configuration.
Displaying Current Port Security Settings
The CLI uses the same command to provide two types of port security listings:
■
All ports on the switch with their Learn Mode and (alarm) Action
■
Only the specified ports with their Learn Mode, Address Limit, (alarm)
Action, and Authorized Addresses
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......