Chapter 47 Configuring Port Security - Cisco Catalyst 4500 Series Configuration Manual

Release ios xe 3.3.0sg and ios 15.1(1)sg
Hide thumbs Also See for Catalyst 4500 Series:
Table of Contents

Advertisement

Port Security Commands
Port Security Commands
This table lists the commands most commonly used with port security.
Command
errdisable recovery cause
psecure-violation
errdisable recovery interval
port-security mac-address
port-security maximum
private-vlan association add
private-vlan isolated
private-vlan primary
switchport mode private-vlan host
switchport private-vlan
host-association
switchport private-vlan mapping
switchport port-security
switchport port-security aging static
switchport port-security aging time
switchport port-security limit rate
invalid-source-mac
switchport port-security mac-address Configures a secure MAC address for
switchport port-security mac-address
mac_address sticky
Software Configuration Guide—Release IOS XE 3.3.0SG and IOS 15.1(1)SG
47-2
Purpose
Brings a secure port out of
error-disabled state.
Customizes the time to recover from
a specified error disable cause.
Configures all secure MAC addresses
on each VLAN.
Configures a maximum number of
MAC addresses on an interface.
Creates an association between a
secondary VLAN and a primary
VLAN.
Designates the VLAN as a private
VLAN.
Specifies the VLAN as the primary
private VLAN.
Specifies that ports with valid private
VLAN trunk association become
active host private VLAN trunk
ports.
Defines a host association on an
isolated host port.
Defines a private VLAN for the
promiscuous ports.
Enables port security.
Configures static aging of MAC
address.
Specifies an aging time for a port.
Sets the rate limit for bad packets.
an interface.
Specifies the sticky MAC address for
an interface.
Chapter 47
Configuring Port Security
Navigation
Violation Actions, page 47-6
Violation Actions, page 47-6
Secure MAC Addresses, page 47-4
Configuring Port Security on Access
Ports, page 47-7
Example of Port Security on an
Isolated Private VLAN Host Port,
page 47-16
Configuring Port Security on an
Isolated Private VLAN Host Port,
page 47-14
Configuring Port Security on an
Isolated Private VLAN Host Port,
page 47-14
Configuring Port Security on an
Isolated Private VLAN Host Port,
page 47-14
Configuring Port Security on an
Isolated Private VLAN Host Port,
page 47-14
Configuring Port Security on an
Isolated Private VLAN Host Port,
page 47-14
Configuring Port Security on Access
Ports, page 47-7
Aging Secure MAC Addresses,
page 47-5
Example 3: Setting the Aging Timer,
page 47-11
Example 7: Setting a Rate Limit for
Bad Packets, page 47-13
Example 5: Configuring a Secure
MAC Address, page 47-12
Configuring Port Security on Access
Ports, page 47-7
OL-25340-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents