C
ONFIGURING
THE
S
WITCH
3-56
CLI
– This example enables SSH, sets the authentication parameters, and
displays the current configuration. It shows that the administrator has
made a connection via SHH, and then disables this connection.
Configuring Port Security
Port security is a feature that allows you to configure a switch port with
one or more device MAC addresses that are authorized to access the
network through that port.
When port security is enabled on a port, the switch stops learning new
MAC addresses on the specified port. Only incoming traffic with source
addresses already stored in the dynamic or static address table will be
accepted as authorized to access the network through that port. If a device
with an unauthorized MAC address attempts to use the switch port, the
Console(config)#ip ssh server
3-48
Console(config)#ip ssh timeout 120
3-49
Console(config)#ip ssh authentication-retries 3
3-50
Console(config)#ip ssh server-key size 768
3-51
Console(config)#end
Console#show ip ssh
3-54
SSH Enabled - version 2.0
Negotiation timeout: 120 secs; Authentication retries: 3
Server key size: 768 bits
Console#show ssh
3-55
Information of secure shell
Session Username Version Encrypt method Negotiation state
------- -------- ------- -------------- -----------------
0 admin 2.0 cipher-3des session-started
Console#disconnect 0
3-25
Console#
Summary of Contents for 8612XL3
Page 2: ......
Page 26: ...CONTENTS xxvi ...
Page 40: ...INTRODUCTION 1 14 ...
Page 69: ...BASIC CONFIGURATION 3 15 ...
Page 175: ...PORT CONFIGURATION 3 121 ...
Page 337: ...IP ROUTING 3 283 Web Click Routing Protocol RIP Statistics ...
Page 379: ...MULTICAST ROUTING 3 325 Command Usage ...
Page 396: ...CONFIGURING THE SWITCH 3 342 ...
Page 582: ...COMMAND LINE INTERFACE 4 186 ...
Page 806: ... 224 Command Mode Privileged Exec Example Console clear vrrp 1 interface 1 counters Console ...
Page 826: ... 6 ...
Page 828: ...TROUBLESHOOTING B 2 ...
Page 838: ...GLOSSARY Glossary 10 ...
Page 845: ......