Port Security Commands - Cisco Catalyst 4500 series Administration Manual

Hide thumbs Also See for Catalyst 4500 series:
Table of Contents

Advertisement

Port Security Commands

Port Security Commands
This table lists the commands most commonly used with port security.
Command
errdisable recovery cause
psecure-violation
errdisable recovery interval
port-security mac-address
port-security maximum
private-vlan association add
private-vlan isolated
private-vlan primary
switchport mode private-vlan host
switchport private-vlan
host-association
switchport private-vlan mapping
switchport port-security
switchport port-security aging static
switchport port-security aging time
switchport port-security limit rate
invalid-source-mac
switchport port-security mac-address Configures a secure MAC address for
switchport port-security mac-address
mac_address sticky
Software Configuration Guide—Release IOS XE 3.6.0E and IOS 15.2(2)E
49-2
Purpose
Brings a secure port out of
error-disabled state.
Customizes the time to recover from
a specified error disable cause.
Configures all secure MAC addresses
on each VLAN.
Configures a maximum number of
MAC addresses on an interface.
Creates an association between a
secondary VLAN and a primary
VLAN.
Designates the VLAN as a private
VLAN.
Specifies the VLAN as the primary
private VLAN.
Specifies that ports with valid private
VLAN trunk association become
active host private VLAN trunk
ports.
Defines a host association on an
isolated host port.
Defines a private VLAN for the
promiscuous ports.
Enables port security.
Configures static aging of MAC
address.
Specifies an aging time for a port.
Sets the rate limit for bad packets.
an interface.
Specifies the sticky MAC address for
an interface.
Chapter 49
Configuring Port Security
Navigation
Violation Actions, page 49-6
Violation Actions, page 49-6
Secure MAC Addresses, page 49-4
Configuring Port Security on Access
Ports, page 49-7
Example of Port Security on an
Isolated Private VLAN Host Port,
page 49-16
Configuring Port Security on an
Isolated Private VLAN Host Port,
page 49-14
Configuring Port Security on an
Isolated Private VLAN Host Port,
page 49-14
Configuring Port Security on an
Isolated Private VLAN Host Port,
page 49-14
Configuring Port Security on an
Isolated Private VLAN Host Port,
page 49-14
Configuring Port Security on an
Isolated Private VLAN Host Port,
page 49-14
Configuring Port Security on Access
Ports, page 49-7
Aging Secure MAC Addresses,
page 49-5
Example 3: Setting the Aging Timer,
page 49-11
Example 7: Setting a Rate Limit for
Bad Packets, page 49-13
Example 5: Configuring a Secure
MAC Address, page 49-12
Configuring Port Security on Access
Ports, page 49-7
OL_28731-01

Advertisement

Table of Contents
loading

Table of Contents