Configuring Port Security - SMC Networks 100BASE-TX Management Manual

Tigerswitch 10/100 16-port fast ethernet switch
Table of Contents

Advertisement

3
Configuring the Switch
CLI – This example enables SSH, sets the authentication parameters, and displays
the current configuration. It shows that the administrator has made a connection via
SHH, and then disables this connection.
Console(config)#ip ssh server
Console(config)#ip ssh timeout 100
Console(config)#ip ssh authentication-retries 5
Console(config)#ip ssh server-key size 512
Console(config)#end
Console#show ip ssh
SSH Enabled - version 2.0
Negotiation timeout: 120 secs; Authentication retries: 5
Server key size: 512 bits
Console#show ssh
Connection Version State
0
2.0
Console#disconnect 0
Console#

Configuring Port Security

Port security is a feature that allows you to configure a switch port with one or more
device MAC addresses that are authorized to access the network through that port.
When port security is enabled on a port, the switch stops learning new MAC
addresses on the specified port when it has reached a configured maximum
number. Only incoming traffic with source addresses already stored in the dynamic
or static address table will be accepted as authorized to access the network through
that port. If a device with an unauthorized MAC address attempts to use the switch
port, the intrusion will be detected and the switch can automatically take action by
disabling the port and sending a trap message.
To use port security, specify a maximum number of addresses to allow on the port
and then let the switch dynamically learn the <source MAC address, VLAN> pair for
frames received on the port. Note that you can also manually add secure addresses
to the port using the Static Address Table (page 3-86). When the port has reached
the maximum number of MAC addresses the selected port will stop learning. The
MAC addresses already in the address table will be retained and will not age out.
Any other device that attempts to use the port will be prevented from accessing the
switch.
Command Usage
• A secure port has the following restrictions:
- Cannot use port monitoring.
- Cannot be a multi-VLAN port.
- It cannot be used as a member of a static or dynamic trunk.
- It should not be connected to a network interconnection device.
• The default maximum number of MAC addresses allowed on a secure port is zero.
You must configure a maximum address count from 1 - 1024 for the port to allow
access.
3-44
Session-Started
Username Encryption
admin
ctos aes128-cbc-hmac-md5
stoc aes128-cbc-hmac-md5
4-36
4-37
4-37
4-38
4-40
4-41
4-18

Advertisement

Table of Contents
loading

This manual is also suitable for:

16 10base-tSmc6716al2

Table of Contents