Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access
SMC6624M(config)# show port-security 3
Port Security
Port : 3
Learn Mode : Static
Action : Send Alarm
Authorized Addresses
--------------------
00906d-fdcc00
Figure 7-5. Example of the Port Security Configuration Display for a Single Port
The following command example shows the option for entering a range of
ports, including a series of non-contiguous ports. Note that no spaces are
allowed in the port number portion of the command string:
SMC6624M(config)# show port-security 1-3,6,8
CLI: Configuring Port Security
Using the CLI, you can:
Configure port security and edit security settings.
I
I
Add or delete devices from the list of authorized addresses for one or
more ports.
Clear the Intrusion flag on specific ports
I
Syntax:
port-security <port-list>
[learn-mode continuous]
[learn-mode static]
[action <none | send-alarm | send-disable>]
[clear-intrusion-flag]
no port-security <port-list> mac-address <mac-addr> [<mac-addr> . . .
For information on the individual control parameters, see the Port Security
Parameter tables on pages 7-12 and 7-14.
Specifying Authorized Devices and Intrusion Responses. This exam-
ple configures port 1 to automatically accept the first device (MAC address)
it detects as the only authorized device for that port. (The default device limit
is 1.) It also configures the port to send an alarm to a network management
station and disable itself if an intruder is detected on the port.
Address Limit : 1
[address-limit <integer>]
[mac-address <mac-addr>] [<mac-addr> . . . <mac-addr>]
<mac-addr>]
Configuring and Monitoring Port Security
7-15