
Chapter 9
| General Security Measures
Port Security
– 284 –
Command Mode
Privileged Exec
Example
This example shows the port security settings and number of secure addresses for
all ports.
Console#show port security
Global Port Security Parameters
Secure MAC Aging Mode : Disabled
Port Security Port Summary
Port Port Security Port Status Intrusion Action MaxMacCnt CurrMacCnt
--------------------------------------------------------------------------
Eth 1/ 1 Disabled Secure/Down None 0 2
Eth 1/ 2 Enabled Secure/Up None 10 0
Eth 1/ 3 Disabled Secure/Down None 0 0
Eth 1/ 4 Disabled Secure/Down None 0 0
Eth 1/ 5 Disabled Secure/Down None 0 0
.
.
.
The following example shows the port security settings and number of secure
addresses for a specific port. The Last Intrusion MAC and Last Time Detected
Intrusion MAC fields show information about the last detected intrusion MAC
address. These fields are not applicable if no intrusion has been detected or port
security is disabled. The MAC Filter ID field is configured by the
command. If this field displays Disabled, then any unknown source
MAC address can be learned as a secure MAC address. If it displays a filter identifier,
then only source MAC address entries in MAC Filter table can be learned as secure
MAC addresses.
Table 54: show port security - display description
Field
Description
Port Security
The configured status (enabled or disabled).
Port Status
The operational status:
◆
Secure/Down – Port security is disabled.
◆
Secure/Up – Port security is enabled.
◆
Shutdown – Port is shut down due to a response to a port security violation.
Intrusion Action
The configured intrusion response.
MaxMacCnt
The maximum number of addresses which can be stored in the address table for
this interface (either dynamic or static).
CurrMacCnt
The current number of secure entries in the address table.
Содержание ECS4120-28F
Страница 36: ...Contents 36...
Страница 38: ...Figures 38...
Страница 46: ...Section I Getting Started 46...
Страница 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Страница 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Страница 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Страница 210: ...Chapter 6 Remote Monitoring Commands 210...
Страница 216: ...Chapter 7 Flow Sampling Commands 216...
Страница 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Страница 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Страница 384: ...Chapter 10 Access Control Lists ACL Information 384...
Страница 424: ...Chapter 11 Interface Commands Power Savings 424...
Страница 446: ...Chapter 13 Power over Ethernet Commands 446...
Страница 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Страница 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Страница 494: ...Chapter 18 Address Table Commands 494...
Страница 554: ...Chapter 20 ERPS Commands 554...
Страница 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Страница 638: ...Chapter 23 Quality of Service Commands 638...
Страница 772: ...Chapter 25 LLDP Commands 772...
Страница 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Страница 826: ...Chapter 27 OAM Commands 826 1 1 00 12 CF 6A 07 F6 000084 Enabled Disabled Enabled Disabled Console...
Страница 836: ...Chapter 28 Domain Name Service Commands 836...
Страница 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Страница 902: ...Section III Appendices 902...
Страница 916: ...Glossary 916...
Страница 926: ...CLI Commands 926...
Страница 937: ......
Страница 938: ...E092017 CS R02...