Purpose
Command or Action
Verifies the configuration.
show interfaces interface-id
Example:
Switch#
show interfaces gigabitethernet1/0/2
Step 9
Verifies your entries.
show running-config
Example:
Switch#
show running-config
Step 10
(Optional) Saves your entries in the configuration file.
copy running-config startup-config
Example:
Switch#
copy running-config startup-config
Step 11
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and
feature information, see Bug Search Tool and the release notes for your platform and software release. To
find information about the features documented in this module, and to see a list of the releases in which each
feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to
. An account on Cisco.com is not
required.
Information About Protected Ports
Protected Ports
Some applications require that no traffic be forwarded at Layer 2 between ports on the same switch so that
one neighbor does not see the traffic generated by another neighbor. In such an environment, the use of
protected ports ensures that there is no exchange of unicast, broadcast, or multicast traffic between these ports
on the switch.
Protected ports have these features:
•
A protected port does not forward any traffic (unicast, multicast, or broadcast) to any other port that is
also a protected port. Data traffic cannot be forwarded between protected ports at Layer 2; only control
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01
397
Configuring Port-Based Traffic Control
Finding Feature Information