U
SER
A
UTHENTICATION
3-75
already in the address table will be retained and will not age out. Any other
device that attempts to use the port will be prevented from accessing the
switch.
Command Usage
•
A secure port has the following restrictions:
- It cannot use port monitoring.
- It cannot be a multi-VLAN port.
- It cannot be used as a member of a static or dynamic trunk.
- It should not be connected to a network interconnection device.
•
The default maximum number of MAC addresses allowed on a secure
port is zero. You must configure a maximum address count from
1 - 1024 for the port to allow access.
•
If a port is disabled (shut down) due to a security violation, it must be
manually re-enabled from the Port/Port Configuration page
(page 3-105).
Command Attributes
•
Port
– Port number.
•
Name
– Descriptive text (page 4-174).
•
Action
– Indicates the action to be taken when a port security violation
is detected:
-
None
: No action should be taken. (This is the default.)
-
Trap
: Send an SNMP trap message.
-
Shutdown
: Disable the port.
-
Trap and Shutdown
: Send an SNMP trap message and disable the
port.
•
Security Status
– Enables or disables port security on the port.
(Default: Disabled)
•
Max MAC Count
– The maximum number of MAC addresses that
can be learned on a port. (Range: 0 - 1024)
•
Trunk
– Trunk number if port is a member (page 3-109 and 3-111).
Summary of Contents for 8700S-130
Page 2: ......
Page 3: ......
Page 8: ...LIMITED WARRANTY iv ...
Page 56: ...INITIAL CONFIGURATION 2 18 ...
Page 189: ...PORT CONFIGURATION 3 133 Figure 3 61 Port Statistics continued ...
Page 566: ...COMMAND LINE INTERFACE 4 294 ...
Page 571: ...SOFTWARE SPECIFICATIONS A 5 Trap RFC 1215 UDP MIB RFC 2012 ...
Page 572: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 576: ...TROUBLESHOOTING B 4 ...
Page 589: ......
Page 591: ...38 Tesla Irvine CA 92618 Phone 949 679 8000 ...
Page 592: ... 8 ...