Cli: Configuring Port Security - SMC Networks SMC6624M Management Manual

Tigerstack ii 10/100 stackable fast ethernet switch
Hide thumbs Also See for SMC6624M:
Table of Contents

Advertisement

Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access
SMC6624M(config)# show port-security 3
Port Security
Port : 3
Learn Mode : Static
Action : Send Alarm
Authorized Addresses
--------------------
00906d-fdcc00
Figure 7-5. Example of the Port Security Configuration Display for a Single Port
The following command example shows the option for entering a range of
ports, including a series of non-contiguous ports. Note that no spaces are
allowed in the port number portion of the command string:
SMC6624M(config)# show port-security 1-3,6,8

CLI: Configuring Port Security

Using the CLI, you can:
Configure port security and edit security settings.
I
I
Add or delete devices from the list of authorized addresses for one or
more ports.
Clear the Intrusion flag on specific ports
I
Syntax:
port-security <port-list>
[learn-mode continuous]
[learn-mode static]
[action <none | send-alarm | send-disable>]
[clear-intrusion-flag]
no port-security <port-list> mac-address <mac-addr> [<mac-addr> . . .
For information on the individual control parameters, see the Port Security
Parameter tables on pages 7-12 and 7-14.
Specifying Authorized Devices and Intrusion Responses. This exam-
ple configures port 1 to automatically accept the first device (MAC address)
it detects as the only authorized device for that port. (The default device limit
is 1.) It also configures the port to send an alarm to a network management
station and disable itself if an intruder is detected on the port.
Address Limit : 1
[address-limit <integer>]
[mac-address <mac-addr>] [<mac-addr> . . . <mac-addr>]
<mac-addr>]
Configuring and Monitoring Port Security
7-15

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

6624fmst6624glsc6624gssc6624gt6624m6624s

Table of Contents