Command Line Interface
4-132
4
Command Usage
• If you enable port security, the switch stops learning new MAC addresses on
the specified port when it has reached a configured maximum number. Only
incoming traffic with source addresses already stored in the dynamic or static
address table will be accepted.
• Use the
port security
command to enable security on a port. Then use the
port security
action
command to set the response to a port security violation,
and the
port security max-mac-count
command to set the maximum
number of addresses allowed on a port.
• You can also manually add secure addresses with the
mac-address-table
static
command.
• A secure port has the following restrictions:
- Cannot be connected to a network interconnection device.
- Cannot be a trunk port.
• If a port is disabled due to a security violation, it must be manually re-enabled
using the
no
shutdown
command.
Example
The following example enables port security for port 5, and sets the response to a
security violation to issue a trap message:
Related Commands
shutdown (4-177)
mac-address-table static (4-197)
show mac-address-table (4-199)
Network Access
(
MAC Address Authentication)
Network Access authentication controls access to the network by authenticating the
MAC address of each host that attempts to connect to a switch port. Traffic received
from a specific MAC address is forwarded by the switch only if the source MAC
address is successfully authenticated by a central RADIUS server. While
authentication for a MAC address is in progress, all traffic is blocked until
authentication is completed. Once successfully authenticated, the RADIUS server
may optionally assign VLAN settings for the switch port.
Console(config)#interface ethernet 1/5
Console(config-if)#port security
Console(config-if)#port security action trap
Console(config-if)#
Table 4-42 Network Access
Command
Function
Mode
Page
network-access mode
Enables MAC authentication on an interface
IC
4-133
network-access
max-mac-count
Sets a maximum for authenticated MAC addresses on an
interface
IC
4-134
mac-authentication
intrusion-action
Determines the port response when a connected host fails
MAC authentication.
IC
4-135
Содержание JetNet 5228G Series
Страница 3: ...www edge core com 2 24FE 4G Layer 2 4 Ethernet Switch Management Guide V1 1...
Страница 24: ...Tables xx...
Страница 310: ...Configuring the Switch 3 264 3...
Страница 636: ...Command Line Interface 4 326 4...
Страница 650: ...Glossary Glossary 8...
Страница 656: ...Index 6 Index...
Страница 657: ......
Страница 658: ......