i
Table of Contents
1 Port Security Configuration······················································································································1-1
Introduction to Port Security····················································································································1-1
Port Security Overview····················································································································1-1
Port Security Features·····················································································································1-2
Port Security Modes ························································································································1-2
Port Security Configuration Task List······································································································1-4
Enabling Port Security·····························································································································1-5
Configuration Prerequisites ·············································································································1-5
Configuration Procedure··················································································································1-5
Setting the Maximum Number of Secure MAC Addresses·····································································1-5
Setting the Port Security Mode ···············································································································1-6
Configuration Prerequisites ·············································································································1-6
Configuring Procedure·····················································································································1-7
Configuring Port Security Features·········································································································1-7
Configuring NTK······························································································································1-7
Configuring Intrusion Protection······································································································1-8
Configuring Trapping·······················································································································1-9
Configuring Secure MAC Addresses ······································································································1-9
Configuration Prerequisites ·············································································································1-9
Configuration Procedure··················································································································1-9
Ignoring Authorization Information from the Server ··············································································1-10
Displaying and Maintaining Port Security ·····························································································1-10
Port Security Configuration Examples ··································································································1-11
Configuring the autoLearn Mode···································································································1-11
Configuring the userLoginWithOUI Mode······················································································1-13
Configuring the macAddressElseUserLoginSecure Mode····························································1-17
Troubleshooting Port Security···············································································································1-19
Cannot Set the Port Security Mode·······························································································1-19
Cannot Configure Secure MAC Addresses···················································································1-20
Cannot Change Port Security Mode When a User Is Online ························································1-20
Содержание 4500G PWR 24-Port
Страница 200: ...1 5 ProviderB GigabitEthernet1 0 2 undo stp enable ProviderB GigabitEthernet1 0 2 bpdu tunnel dot1q stp ...
Страница 252: ...1 7 Clearing ARP entries from the ARP table may cause communication failures ...
Страница 362: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1 ...
Страница 407: ...1 8 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete ...
Страница 786: ...1 16 3 In the case of PIM SM use the display current configuration command to check the BSR and RP information ...
Страница 1387: ...1 23 ...
Страница 1443: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 1720: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5 ...