Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access
CLI: Port Security Command Options and Operation
Port Security Commands Used in This Section
show port-security
port-security
This section describes the CLI port security command and how the switch
acquires and maintains authorized addresses.
N o t e
Use the global configuration level to execute port-security configuration
commands.
page 7-16: "CLI: Displaying Current Port Security Settings"
page 7-17: "CLI: Configuring Port Security"
<[ethernet] port-list>
page 7-17: "CLI: Configuring Port Security"
[learn-mode continuous]
page 7-18: "Adding an Authorized Device to a Port"
[learn-mode static]
page 7-18: "Adding an Authorized Device to a Port"
[address-limit]
page 7-18: "Adding an Authorized Device to a Port"
[mac-address]
page 7-18: "Adding an Authorized Device to a Port"
[action]
page 7-18: "Adding an Authorized Device to a Port"
no port-security
page 7-20: "Removing a Device From the "Authorized" List for
a Port"
[clear-intrusion-flag]
page 7-25: "CLI: Checking for Intrusions, Listing Intrusion
Alerts, and Resetting Alert Flags"
Configuring and Monitoring Port Security
7-13