23-11
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
Chapter 23 Configuring Port-Based Traffic Control
Configuring Port Security
•
shutdown vlan—Use to set the security violation mode per-VLAN. In this mode, the VLAN is error
disabled instead of the entire port when a violation occurs.
Table 23-1
shows the violation mode and the actions taken when you configure an interface for port
security.
Default Port Security Configuration
Table 23-2
shows the default port security configuration for an interface.
Port Security Configuration Guidelines
Follow these guidelines when configuring port security:
•
Port security can only be configured on static access ports or trunk ports. A secure port cannot be a
dynamic access port.
•
A secure port cannot be a destination port for Switched Port Analyzer (SPAN).
Table 23-1
Security Violation Mode Actions
Violation Mode
Traffic is
forwarded
1
1.
Packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses.
Sends SNMP
trap
Sends syslog
message
Displays error
message
2
2.
The switch returns an error message if you manually configure an address that would cause a security violation.
Violation
counter
increments
Shuts down port
protect
No
No
No
No
No
No
restrict
No
Yes
Yes
No
Yes
No
shutdown
No
Yes
Yes
No
Yes
Yes
shutdown vlan
No
Yes
Yes
No
Yes
No
3
3.
Shuts down only the VLAN on which the violation occurred.
Table 23-2
Default Port Security Configuration
Feature
Default Setting
Port security
Disabled on a port.
Sticky address learning
Disabled.
Maximum number of secure
MAC addresses per port
1.
Violation mode
Shutdown. The port shuts down when the maximum number of
secure MAC addresses is exceeded.
Port security aging
Disabled. Aging time is 0.
Static aging is disabled.
Type is absolute.