
Chapter 8
| General Security Measures
Port Security
– 260 –
The following example shows the port security settings and number of secure
addresses for a specific port. The Last Intrusion MAC and Last Time Detected
Intrusion MAC fields show information about the last detected intrusion MAC
address. These fields are not applicable if no intrusion has been detected or port
security is disabled. The MAC Filter ID field is configured by the
command. If this field displays Disabled, then any unknown source
MAC address can be learned as a secure MAC address. If it displays a filter identifier,
then only source MAC address entries in MAC Filter table can be learned as secure
MAC addresses.
Console#show port security interface ethernet 1/2
Global Port Security Parameters
Secure MAC Aging Mode : Disabled
Port Security Details
Port : 1/2
Port Security : Enabled
Port Status : Secure/Up
Intrusion Action : None
Max-MAC-Count : 0
Current MAC Count : 0
MAC Filter ID : Disabled
Last Intrusion MAC : NA
Last Time Detected Intrusion MAC : NA
Console#
This example shows information about a detected intrusion.
Console#show port security interface ethernet 1/2
Global Port Security Parameters
Secure MAC Aging Mode : Disabled
Port Security Details
Port : 1/2
Port Security : Enabled
Port Status : Secure/Up
Intrusion Action : None
Max MAC Count : 0
Current MAC Count : 0
Table 50: show port security - display description
Field
Description
Port Security
The configured status (enabled or disabled).
Port Status
The operational status:
◆
Secure/Down – Port security is disabled.
◆
Secure/Up – Port security is enabled.
◆
Shutdown – Port is shut down due to a response to a port security violation.
Intrusion Action
The configured intrusion response.
MaxMacCnt
The maximum number of addresses which can be stored in the address table for
this interface (either dynamic or static).
CurrMacCnt
The current number of secure entries in the address table.
Содержание AS5700-54X
Страница 42: ...Contents 42...
Страница 44: ...Figures 44...
Страница 52: ...Tables 52...
Страница 54: ...Section I Getting Started 54...
Страница 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Страница 210: ...Chapter 6 Remote Monitoring Commands 210...
Страница 358: ...Chapter 9 Access Control Lists ACL Information 358...
Страница 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Страница 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Страница 442: ...Chapter 16 Address Table Commands 442...
Страница 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Страница 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Страница 544: ...Chapter 20 Quality of Service Commands 544...
Страница 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Страница 680: ...Chapter 23 LLDP Commands 680...
Страница 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Страница 732: ...Chapter 25 Domain Name Service Commands 732...
Страница 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Страница 1072: ...Section III Appendices 1072...
Страница 1090: ...Glossary 1090 XModem A protocol used to transfer files between devices Data is grouped in 128 byte blocks and error corrected...
Страница 1102: ...List of CLI Commands 1102...
Страница 1115: ......
Страница 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...