U
A
SER
UTHENTICATION
Port Security Commands
These commands can be used to enable port security on a port. When
using port security, the switch stops learning new MAC addresses on the
specified port when it has reached a configured maximum number. Only
incoming traffic with source addresses already stored in the dynamic or
static address table for this port will be authorized to access the network.
The port will drop any incoming frames with a source MAC address that is
unknown or has been previously learned from another port. If a device
with an unauthorized MAC address attempts to use the switch port, the
intrusion will be detected and the switch can automatically take action by
disabling the port and sending a trap message.
Command
port security
mac-address-table static Maps a static address to a port in a
show mac-address-table Displays entries in the
22-34
C
OMMANDS
Table 22-12 Port Security Commands
Function
Configures a secure port
VLAN
bridge-forwarding database
Mode Page
IC
22-35
GC
28-2
PE
28-4
Need help?
Do you have a question about the TigerStack II SMC8848M and is the answer not in the manual?
Questions and answers