Verifying Port Security Violations Using The Cli - Cisco 9134 - MDS Multilayer Fabric Switch Troubleshooting Manual

Mds 9000 family
Hide thumbs Also See for 9134 - MDS Multilayer Fabric Switch:
Table of Contents

Advertisement

Chapter 19
Troubleshooting FC-SP, Port Security, and Fabric Binding
S e n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a c k - d o c @ c i s c o . c o m
Optionally, remove the device from the switch, choose Switches > Interfaces > FC Physical and select
Step 3
up from the Admin Status drop-down menu to bring the port back online. Click Apply Changes.
Note

Verifying Port Security Violations Using the CLI

To verify port security violations using the CLI, follow these steps:
Use the show port-security violations command and search for the interface that is shut down.
Step 1
switch# show port-security violations
------------------------------------------------------------------------------------------
VSAN
------------------------------------------------------------------------------------------
1
1
2
[Total 2 entries]
In this example, pWWN
of port security violations.
Optionally follow these steps to add the device to the port security database:
Step 2
a.
b.
c.
d.
e.
Step 3
Optionally, remove the device from the switch and use the no shutdown command to bring the port back
online.
OL-9285-05
You may need to set the interface down and then up to bring it back online.
Interface
Logging-in Entity
fc1/13
21:00:00:e0:8b:06:d9:1d(pwwn)
20:00:00:e0:8b:06:d9:1d(nwwn)
fc1/12
50:06:04:82:bc:01:c3:84(pwwn)
50:06:04:82:bc:01:c3:84(nwwn)
port-channel 1 20:00:00:05:30:00:95:de(swwn)
21:00:00:e0:8b:06:d9:1d
Use the port-security database copy command to copy the active database to the configure
database. This ensures that no learned entries are lost.
switch# port-security database copy vsan 3
Use the port-security database command to add a new entry into the configure database.
switch(config)# port-security database vsan 3
switch(config-port-security)# pwwn 20:11:33:11:00:2a:4a:66 swwn
20:00:00:0c:85:90:3e:80 interface fc1/13
Use the port-security activate command to copy the configure database to the active database and
reactivate port security.
switch(config)# port-security activate vsan 3
If CFS distribution is enabled, use the port-security commit command to distribute these changes.
switch(config)# port-security commit vsan 3
Use the no shutdown command in interface mode to bring the port back online.
Last-Time
Jul 9 08:32:20 2003
Jul 9 08:32:20 2003
Jul 9 08:32:40 2003
is causing interface fc1/13 to be shut down because
Cisco MDS 9000 Family Troubleshooting Guide, Release 3.x
Port Security Issues
[Repeat count]
[20]
[1]
[1]
19-11

Hide quick links:

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents