
Chapter 8
| General Security Measures
Port Security
– 256 –
Port Security
These commands can be used to enable port security on a port.
When MAC address learning is disabled on an interface, only incoming traffic with
source addresses already stored in the dynamic or static address table for this port
will be authorized to access the network.
When using port security, the switch stops learning new MAC addresses on the
specified port when it has reached a configured maximum number. Only incoming
traffic with source addresses already stored in the dynamic or static address table
for this port will be authorized to access the network. The port will drop any
incoming frames with a source MAC address that is unknown or has been
previously learned from another port. If a device with an unauthorized MAC
address attempts to use the switch port, the intrusion will be detected and the
switch can automatically take action by disabling the port and sending a trap
message.
mac-learning
This command enables MAC address learning on the selected interface. Use the
no
form to disable MAC address learning.
Syntax
[
no
]
mac-learning
Default Setting
Enabled
Command Mode
Interface Configuration (Ethernet or Port Channel)
Command Usage
◆
The
no mac-learning
command immediately stops the switch from learning
new MAC addresses on the specified port or trunk. Incoming traffic with source
addresses not stored in the static address table, will be flooded. However, if a
security function such as 802.1X or DHCP snooping is enabled and mac-
learning is disabled, then only incoming traffic with source addresses stored in
Table 49: Port Security Commands
Command
Function
Mode
Maps a static address to a port in a VLAN
GC
Enables MAC address learning on the selected physical
interface or VLAN
IC
Configures a secure port
IC
Displays entries in the bridge-forwarding database
PE
Displays port security status and secure address count
PE
Содержание AS5700-54X
Страница 42: ...Contents 42...
Страница 44: ...Figures 44...
Страница 52: ...Tables 52...
Страница 54: ...Section I Getting Started 54...
Страница 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Страница 210: ...Chapter 6 Remote Monitoring Commands 210...
Страница 358: ...Chapter 9 Access Control Lists ACL Information 358...
Страница 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Страница 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Страница 442: ...Chapter 16 Address Table Commands 442...
Страница 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Страница 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Страница 544: ...Chapter 20 Quality of Service Commands 544...
Страница 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Страница 680: ...Chapter 23 LLDP Commands 680...
Страница 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Страница 732: ...Chapter 25 Domain Name Service Commands 732...
Страница 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Страница 1072: ...Section III Appendices 1072...
Страница 1090: ...Glossary 1090 XModem A protocol used to transfer files between devices Data is grouped in 128 byte blocks and error corrected...
Страница 1102: ...List of CLI Commands 1102...
Страница 1115: ......
Страница 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...