Cisco Catalyst 4500 series Administration Manual page 1303

Hide thumbs Also See for Catalyst 4500 series:
Table of Contents

Advertisement

Chapter 49
Configuring Port Security
Command
Step 6
Switch(config-if)# [no] switchport port-security
violation {restrict | shutdown | shutdown vlan}
Step 7
Switch(config-if)# switchport port-security limit
rate invalid-source-mac packets_per_sec
Step 8
Switch(config-if)# [no] switchport port-security
mac-address mac_address
Step 9
Switch(config-if)# [no] switchport port-security
mac-address sticky
OL_28731-01
Purpose
(Optional) Sets the violation mode, the action to be taken
when a security violation is detected, as one of these:
restrict—A port security violation restricts data and
causes the SecurityViolation counter to increment
and send an SNMP trap notification.
shutdown—The interface is error-disabled when a
security violation occurs.
shutdown vlan—Use to set the security violation
mode for each VLAN. In this mode, the VLAN is
error-disabled instead of the entire port when a
violation occurs.
Note
When a secure port is in the error-disabled state,
you can bring it out of this state by entering the
errdisable recovery cause psecure-violation
global configuration command or you can
manually reenable it by entering the shutdown
and no shut down interface configuration
commands.
To return the violation mode to the default condition
(shutdown mode), use the
no switchport port-security violation shutdown
command.
Sets the rate limit for bad packets.
Default is 10 pps.
(Optional) Enters a secure MAC address for the interface.
You can use this command to configure a secure MAC
addresses. If you configure fewer secure MAC addresses
than the maximum, the remaining MAC addresses are
dynamically learned.
To delete a MAC address from the address table, use the
no switchport port-security mac-address mac_address
command.
This command only applies to access, PVLAN
Note
host, and PVLAN promiscuous mode. For more
details on PVLAN, trunk, or regular trunk mode,
refer to the
Ports" section on page
(Optional) Enables sticky learning on the interface.
To disable sticky learning on an interface, use the
no switchport port-security mac-address sticky
command. The interface converts the sticky secure MAC
addresses to dynamic secure addresses.
Software Configuration Guide—Release IOS XE 3.6.0E and IOS 15.2(2)E
Configuring Port Security on Access Ports
"Configuring Port Security on Trunk
49-17.
49-9

Advertisement

Table of Contents
loading

Table of Contents