C H A P T E R
38-1
Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7
OL-8978-04
38
Configuring Port Security
This chapter describes how to configure port security and how to limit the number of MAC addresses
that are learned on the Catalyst 6500 series switches.
Note
For complete syntax and usage information for the commands that are used in this chapter, refer to the
Catalyst 6500 Series Switch Command Reference
publication.
Note
For information on configuring MAC address authentication bypass, see
Chapter 41, “Configuring MAC
Authentication Bypass.”
Note
For information on configuring 802.1X authentication to restrict the unauthorized devices from
connecting to a LAN through the publicly accessible ports, see
Chapter 40, “Configuring 802.1X
Authentication.”
Note
For information on configuring authentication, authorization, and accounting (AAA) to monitor and
control access to the command-line interface (CLI) on the Catalyst 6500 series switches, see
Chapter 39,
“Configuring the Switch Access Using AAA.”
Note
For information on configuring network admission control, see
Chapter 44, “Configuring Network
Admission Control.”
This chapter consists of these sections:
•
Understanding How Port Security Works, page 38-2
•
Understanding How MAC-Address Monitoring Works, page 38-3
•
Port Security Configuration Guidelines, page 38-4
•
Configuring Port Security on the Switch, page 38-4
•
Configuring MAC-Address Monitoring, page 38-14