Configuring Port-Based Traffic Control
Command or Action
Step 9
show interfaces interface-id
Example:
Switch# show interfaces gigabitethernet1/0/2
Step 10
show running-config
Example:
Switch# show running-config
Step 11
copy running-config startup-config
Example:
Switch# copy running-config startup-config
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and
feature information, see Bug Search Tool and the release notes for your platform and software release. To
find information about the features documented in this module, and to see a list of the releases in which each
feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not
required.
Information About Protected Ports
Protected Ports
Some applications require that no traffic be forwarded at Layer 2 between ports on the same switch so that
one neighbor does not see the traffic generated by another neighbor. In such an environment, the use of
protected ports ensures that there is no exchange of unicast, broadcast, or multicast traffic between these ports
on the switch.
Protected ports have these features:
• A protected port does not forward any traffic (unicast, multicast, or broadcast) to any other port that is
OL-29048-01
also a protected port. Data traffic cannot be forwarded between protected ports at Layer 2; only control
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
Purpose
Verifies the configuration.
Verifies your entries.
(Optional) Saves your entries in the configuration file.
Finding Feature Information
397