Displaying Port Security Configuration
129
Before continuing, make sure that:
■
Port security is enabled.
■
The maximum number of security MAC addresses allowed on the port is set.
■
The security mode of the port is set to
autolearn
.
Displaying Port
Security Configuration
After the above configuration, you can use the
display
command in any view to
display port security information and verify your configuration.
Port Security
Configuration
Example
Port Security
Configuration Example
Network requirements
Implement access user restrictions through the following configuration on
Ethernet1/0/1 of the switch.
■
Allow a maximum of 80 users to access the port without authentication and
permit the port to learn and add the MAC addresses of the users as security
MAC addresses.
■
To ensure that Host can access the network, add the MAC address
0001-0002-0003 of Host as a security MAC address to the port in VLAN 1.
■
After the number of security MAC addresses reaches 80, the port stops
learning MAC addresses. If any frame with an unknown MAC address arrives,
intrusion protection is triggered and the port will be disabled and stay silent for
30 seconds.
Table 86
Configure a security MAC address
Operation
Command
Remarks
Enter system view
system-view
-
Add a security
MAC address
In system
view
mac-address security
mac-address
interface
interface-type
interface-number
vlan
vlan-id
Either is required.
By default, no security MAC
address is configured.
In Ethernet
port view
interface
interface-type
interface-number
mac-address security
mac-address
vlan
vlan-id
Table 87
Display port security configuration
Operation
Command
Remarks
Display information about
port security configuration
display port-security
[
interface
interface-list
]
You can execute the
display
command in any view.
Display information about
security MAC address
configuration
display mac-address
security
[
interface
interface-type
interface-number
] [
vlan
vlan-id
] [
count
]
Содержание Switch 4210 9-Port
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564 ...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Страница 340: ...338 CHAPTER 30 CLUSTER ...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...