Cisco 3750G - Catalyst Integrated Wireless LAN Controller Configuration Manual page 587

Software configuration guide
Hide thumbs Also See for 3750G - Catalyst Integrated Wireless LAN Controller:
Table of Contents

Advertisement

Chapter 25
Configuring Port-Based Traffic Control
Command
Step 7
switchport port-security violation
{protect | restrict | shutdown}
Step 8
switchport port-security
[mac-address mac-address [vlan
{vlan-id | {access | voice}}]
Step 9
switchport port-security
mac-address sticky
OL-8550-02
Purpose
(Optional) Set the violation mode, the action to be taken when a security
violation is detected, as one of these:
protect—When the number of port secure MAC addresses reaches the
maximum limit allowed on the port, packets with unknown source
addresses are dropped until you remove a sufficient number of secure
MAC addresses to drop below the maximum value or increase the number
of maximum allowable addresses. You are not notified that a security
violation has occurred.
We do not recommend configuring the protect mode on a trunk port.
Note
The protect mode disables learning when any VLAN reaches its
maximum limit, even if the port has not reached its maximum limit.
restrict—When the number of secure MAC addresses reaches the limit
allowed on the port, packets with unknown source addresses are dropped
until you remove a sufficient number of secure MAC addresses or
increase the number of maximum allowable addresses. An SNMP trap is
sent, a syslog message is logged, and the violation counter increments.
shutdown—The interface is error-disabled when a violation occurs, and
the port LED turns off. An SNMP trap is sent, a syslog message is logged,
and the violation counter increments.
Note
When a secure port is in the error-disabled state, you can bring it out
of this state by entering the errdisable recovery cause
psecure-violation global configuration command, or you can
manually re-enable it by entering the shutdown and no shutdown
interface configuration commands.
(Optional) Enter a secure MAC address for the interface. You can use this
command to enter the maximum number of secure MAC addresses. If you
configure fewer secure MAC addresses than the maximum, the remaining
MAC addresses are dynamically learned.
If you enable sticky learning after you enter this command, the secure
Note
addresses that were dynamically learned are converted to sticky
secure MAC addresses and are added to the running configuration.
(Optional) vlan—set a per-VLAN maximum value.
Enter one of these options after you enter the vlan keyword:
vlan-id—On a trunk port, you can specify the VLAN ID and the MAC
address. If you do not specify a VLAN ID, the native VLAN is used.
access—On an access port, specify the VLAN as an access VLAN.
voice—On an access port, specify the VLAN as a voice VLAN.
Note
The voice keyword is available only if a voice VLAN is configured on
a port and if that port is not the access VLAN. If an interface is
configured for voice VLAN, configure a maximum of two secure
MAC addresses.
(Optional) Enable sticky learning on the interface.
Catalyst 3750 Switch Software Configuration Guide
Configuring Port Security
25-13

Advertisement

Table of Contents
loading

Table of Contents