Chapter 8
| General Security Measures
Port Security
– 220 –
Port Security
These commands can be used to enable port security on a port.
When using port security, the switch stops learning new MAC addresses on the
specified port when it has reached a configured maximum number. Only incoming
traffic with source addresses already stored in the dynamic or static address table
for this port will be authorized to access the network. The port will drop any
incoming frames with a source MAC address that is unknown or has been
previously learned from another port. If a device with an unauthorized MAC
address attempts to use the switch port, the intrusion will be detected and the
switch can automatically take action by disabling the port and sending a trap
message.
port security
This command enables or configures port security. Use the
no
form without any
keywords to disable port security. Use the
no
form with the appropriate keyword to
restore the default settings for a response to a security violation or for the
maximum number of allowed addresses.
Syntax
port security
[[
action
{
shutdown
|
trap
|
trap-and-shutdown
}] |
[
max-mac-count
address-count
]]
no port security
[
action
|
max-mac-count
]
action
- Response to take when port security is violated.
shutdown
- Disable port only.
trap
- Issue SNMP trap message only.
trap-and-shutdown
- Issue SNMP trap message and disable port.
max-mac-count
address-count
- The maximum number of MAC addresses that can be
learned on a port. (Range: 0 - 1024, where 0 means disabled)
Default Setting
Status: Disabled
Action: None
Maximum Addresses: 0
Table 46: Management IP Filter Commands
Command
Function
Mode
mac-address-table static
Maps a static address to a port in a VLAN
GC
port security
Configures a secure port
IC
show mac-address-table
Displays entries in the bridge-forwarding database
PE
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...