Default Protected Port Configuration; Protected Port Configuration Guidelines; Configuring A Protected Port - Cisco Catalyst 2975 Software Configuration Manual

Ios release 12.2(55)se
Hide thumbs Also See for Catalyst 2975:
Table of Contents

Advertisement

Chapter 23
Configuring Port-Based Traffic Control
Because a switch stack represents a single logical switch, Layer 2 traffic is not forwarded between any
protected ports in the switch stack, whether they are on the same or different switches in the stack.
These sections contain this configuration information:

Default Protected Port Configuration

The default is to have no protected ports defined.

Protected Port Configuration Guidelines

You can configure protected ports on a physical interface (for example, Gigabit Ethernet port 1) or an
EtherChannel group (for example, port-channel 5). When you enable protected ports for a port channel,
it is enabled for all ports in the port-channel group.

Configuring a Protected Port

Beginning in privileged EXEC mode, follow these steps to define a port as a protected port:
Command
Step 1
configure terminal
Step 2
interface interface-id
Step 3
switchport protected
Step 4
end
Step 5
show interfaces interface-id switchport
Step 6
copy running-config startup-config
To disable protected port, use the no switchport protected interface configuration command.
This example shows how to configure a port as a protected port:
Switch# configure terminal
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# switchport protected
Switch(config-if)# end
OL-19720-02
Default Protected Port Configuration, page 23-7
Protected Port Configuration Guidelines, page 23-7
Configuring a Protected Port, page 23-7
Purpose
Enter global configuration mode.
Specify the interface to be configured, and enter interface
configuration mode.
Configure the interface to be a protected port.
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
Catalyst 2975 Switch Software Configuration Guide
Configuring Protected Ports
23-7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents