hit counter script

Understanding Port Security - Cisco 3032 Software Configuration Manual

Hide thumbs Also See for 3032:
Table of Contents

Advertisement

Chapter 26
Configuring Port-Based Traffic Control
If a uplink port is configured as a secure port and the maximum number of secure MAC addresses is
reached, when the MAC address of a station attempting to access the port is different from any of the
identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC
address configured or learned on one secure port attempts to access another secure port, a violation is
flagged.
These sections contain this conceptual and configuration information:

Understanding Port Security

These sections contain this conceptual information:
Secure MAC Addresses
You configure the maximum number of secure addresses allowed on an uplink port by using the
switchport port-security maximum value interface configuration command.
If you try to set the maximum value to a number less than the number of secure addresses already
Note
configured on an interface, the command is rejected.
The switch supports these types of secure MAC addresses:
You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses
and to add them to the running configuration by enabling sticky learning. To enable sticky learning, enter
the switchport port-security mac-address sticky interface configuration command. When you enter
this command, the interface converts all the dynamic secure MAC addresses, including those that were
dynamically learned before sticky learning was enabled, to sticky secure MAC addresses. All sticky
secure MAC addresses are added to the running configuration.
OL-12247-04
Understanding Port Security, page 26-9
Default Port Security Configuration, page 26-11
Port Security Configuration Guidelines, page 26-11
Enabling and Configuring Port Security, page 26-13
Enabling and Configuring Port Security Aging, page 26-17
Port Security and Switch Stacks, page 26-18
Port Security and Private VLANs, page 26-18
Secure MAC Addresses, page 26-9
Security Violations, page 26-10
Static secure MAC addresses—These are manually configured by using the switchport
port-security mac-address mac-address interface configuration command, stored in the address
table, and added to the switch running configuration.
Dynamic secure MAC addresses—These are dynamically configured, stored only in the address
table, and removed when the switch restarts.
Sticky secure MAC addresses—These can be dynamically learned or manually configured, stored in
the address table, and added to the running configuration. If these addresses are saved in the
configuration file, when the switch restarts, the interface does not need to dynamically reconfigure
them.
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
Configuring Port Security
26-9

Advertisement

Table of Contents
loading

This manual is also suitable for:

3130

Table of Contents