User’s Manual of IGSW-2840
466
* The priority of execution for these filtering commands is Port Security, Port Authentication, Network Access, Web
Authentication, Access Control Lists, DHCP Snooping, and then IP Source Guard.
5.13.1 Port Security Commands
These commands can be used to enable port security on a port. When using port security, the switch stops learning new MAC
addresses on the specified port when it has reached a configured maximum number. Only incoming traffic with source
addresses already stored in the dynamic or static address table for this port will be authorized to access the network. The port
will drop any incoming frames with a source MAC address that is unknown or has been previously learned from another port. If a
device with an unauthorized MAC address attempts to use the switch port, the intrusion will be detected and the switch can
automatically take action by disabling the port and sending a trap message.
Command
Function
Mode
port security
Configures a secure port
IC
mac-address-table static
Maps a static address to a port in a VLAN
GC
show mac-address-table
Displays entries in the bridge-forwarding database
PE
Table 5-41
Port Security Commands
port security
This command enables or configures port security. Use the no form without any keywords to disable port security. Use the no
form with the appropriate keyword to restore the default settings for a response to security violation or for the maximum number
of allowed addresses.
Syntax
port security [action {shutdown | trap | trap-and-shutdown} | max-mac-count address-count] no port security [action |
max-mac-count] action -Response to take when port security is violated. -shutdown - Disable port only. -trap - Issue
SNMP trap message only. -trap-and-shutdown - Issue SNMP trap message and disable port. max-mac-count
-address-count - The maximum number of MAC addresses that can be learned on a port. (Range: 0-1024)
Default Setting
Status: Disabled
Action: None
Maximum Addresses: 0
Command Mode
Interface Configuration (Ethernet)
Command Usage
If you enable port security, the switch stops learning new MAC addresses on the specified port when it has reached a
configured maximum number. Only incoming traffic with source addresses already stored in the dynamic or static address
table will be accepted.
Содержание IGSW-2840
Страница 23: ...User s Manual of IGSW 2840 23 A 2 10 100Mbps 10 100Base TX 665 APPENDEX B GLOSSARY 667 ...
Страница 110: ...User s Manual of IGSW 2840 110 Figure 4 3 14 SNMPv3 View Edit screenshot ...
Страница 119: ...User s Manual of IGSW 2840 119 Figure 4 4 7 Mirror Port Configuration screenshot ...
Страница 205: ...User s Manual of IGSW 2840 205 Multicast Service Multicast flooding ...
Страница 216: ...User s Manual of IGSW 2840 216 Figure 4 9 7 IGMP Member Port Table screenshot ...
Страница 280: ...User s Manual of IGSW 2840 280 Figure 4 11 19 SSH Host Key Settings screenshot ...
Страница 315: ...User s Manual of IGSW 2840 315 Figure 4 11 44 MAC ACL Settings screenshot ...
Страница 317: ...User s Manual of IGSW 2840 317 Figure 4 11 46 ACL Port Binding Settings screenshot ...
Страница 431: ...User s Manual of IGSW 2840 431 tacacs 1 Console ...