Security Violations - Cisco 3020 - Catalyst Blade Switch Configuration Manual

Cisco catalyst blade switch 3020 for hp software configuration guide, rel. 12.2(25)sef1
Hide thumbs Also See for 3020 - Cisco Catalyst Blade Switch:
Table of Contents

Advertisement

Chapter 19
Configuring Port-Based Traffic Control
The maximum number of secure MAC addresses that you can configure on a switch is set by the
maximum number of available MAC addresses allowed in the system. This number is the total of
available MAC addresses, including those used for other Layer 2 functions and any other secure MAC
addresses configured on interfaces.

Security Violations

It is a security violation when one of these situations occurs:
You can configure the interface for one of three violation modes, based on the action to be taken if a
violation occurs:
Table 19-1
security.
Table 19-1
Security Violation Mode Actions
Traffic is
Violation Mode
forwarded
protect
No
restrict
No
shutdown
No
1. Packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses.
2. The switch returns an error message if you manually configure an address that would cause a security violation.
OL-8915-01
The maximum number of secure MAC addresses have been added to the address table, and a station
whose MAC address is not in the address table attempts to access the interface.
An address learned or configured on one secure interface is seen on another secure interface in the
same VLAN.
protect—when the number of secure MAC addresses reaches the maximum limit allowed on the
port, packets with unknown source addresses are dropped until you remove a sufficient number of
secure MAC addresses to drop below the maximum value or increase the number of maximum
allowable addresses. You are not notified that a security violation has occurred.
We do not recommend configuring the protect violation mode on a trunk port. The protect
Note
mode disables learning when any VLAN reaches its maximum limit, even if the port has not
reached its maximum limit.
restrict—when the number of secure MAC addresses reaches the maximum limit allowed on the
port, packets with unknown source addresses are dropped until you remove a sufficient number of
secure MAC addresses to drop below the maximum value or increase the number of maximum
allowable addresses. In this mode, you are notified that a security violation has occurred. An SNMP
trap is sent, a syslog message is logged, and the violation counter increments.
shutdown—a port security violation causes the interface to become error-disabled and to shut down
immediately, and the port LED turns off. An SNMP trap is sent, a syslog message is logged, and the
violation counter increments. When a secure port is in the error-disabled state, you can bring it out
of this state by entering the errdisable recovery cause psecure-violation global configuration
command, or you can manually re-enable it by entering the shutdown and no shut down interface
configuration commands. This is the default mode.
shows the violation mode and the actions taken when you configure an interface for port
Sends SNMP
1
trap
No
Yes
Yes
Sends syslog
Displays error
message
message
No
No
Yes
No
Yes
No
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
Configuring Port Security
Violation
counter
2
increments
No
Yes
Yes
Shuts down port
No
No
Yes
19-9

Advertisement

Table of Contents
loading

Table of Contents