Checking Configurations; Maintenance; Example For Configuring Port Security Mac - Raisecom ISCOM2600G-HI (A) Series Configuration Manual

Table of Contents

Advertisement

Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
After sticky secure MAC address learning is enabled, the dynamic secure MAC
address will be converted to the sticky secure MAC address; the manually configured
sticky secure MAC address will take effect.

10.2.8 Checking configurations

Use the following commands to check configuration results.
1
2

10.2.9 Maintenance

Maintain the ISCOM2600G-HI series switch as below.
Raisecom(config-
gigaethernet1/1/port)#clear port-security
{ all | configured | dynamic | sticky }

10.2.10 Example for configuring port security MAC

Networking requirements
As shown in Figure 10-1, the Switch connects 3 user networks. To ensure security of data
accessed from the interface, configure the Switch as below.
No.
Command
Raisecom#show port-security
[
interface-type interface-
number
]
Raisecom#show port-security
mac-address [
interface-number
Command
GE 1/1/1 allows up to 3 users to access the network. One of specified user MAC
addresses is 0000.0000.0001. The other two users are in dynamic learning mode. The
NMS can receive Trap information once the user learns a MAC address. The violation
mode is Protect mode and the aging time of the two learning user MAC addresses is
10min.
GE 1/1/2 allows up to 2 users to access the network. MAC addresses of the 2 users are
determined through learning; once they are learnt, they will not be aged. The violation
mode is Restrict mode.
GE 1/1/3 allows up to 1 user to access the network. The specified user MAC address is
0000.0000.0002. Whether MAC addresses are aged can be controlled. The violation
mode is Shutdown mode.
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
Show configurations of port security
MAC.
Show configurations of secure MAC
interface-type
address and secure MAC address
]
learning.
Description
Description
Clear a specified type of secure
MAC addresses on a specified
interface.
10 Security
408

Advertisement

Table of Contents
loading

Table of Contents

Save PDF