U
SER
A
UTHENTICATION
3-75
already in the address table will be retained and will not age out. Any other
device that attempts to use the port will be prevented from accessing the
switch.
Command Usage
•
A secure port has the following restrictions:
- It cannot use port monitoring.
- It cannot be a multi-VLAN port.
- It cannot be used as a member of a static or dynamic trunk.
- It should not be connected to a network interconnection device.
•
The default maximum number of MAC addresses allowed on a secure
port is zero. You must configure a maximum address count from
1 - 1024 for the port to allow access.
•
If a port is disabled (shut down) due to a security violation, it must be
manually re-enabled from the Port/Port Configuration page
(page 3-105).
Command Attributes
•
Port
– Port number.
•
Name
– Descriptive text (page 4-174).
•
Action
– Indicates the action to be taken when a port security violation
is detected:
-
None
: No action should be taken. (This is the default.)
-
Trap
: Send an SNMP trap message.
-
Shutdown
: Disable the port.
-
Trap and Shutdown
: Send an SNMP trap message and disable the
port.
•
Security Status
– Enables or disables port security on the port.
(Default: Disabled)
•
Max MAC Count
– The maximum number of MAC addresses that
can be learned on a port. (Range: 0 - 1024)
•
Trunk
– Trunk number if port is a member (page 3-109 and 3-111).
Содержание 8700S-130
Страница 2: ......
Страница 3: ......
Страница 8: ...LIMITED WARRANTY iv ...
Страница 56: ...INITIAL CONFIGURATION 2 18 ...
Страница 189: ...PORT CONFIGURATION 3 133 Figure 3 61 Port Statistics continued ...
Страница 566: ...COMMAND LINE INTERFACE 4 294 ...
Страница 571: ...SOFTWARE SPECIFICATIONS A 5 Trap RFC 1215 UDP MIB RFC 2012 ...
Страница 572: ...SOFTWARE SPECIFICATIONS A 6 ...
Страница 576: ...TROUBLESHOOTING B 4 ...
Страница 589: ......
Страница 591: ...38 Tesla Irvine CA 92618 Phone 949 679 8000 ...
Страница 592: ... 8 ...