How to Configure Protected Ports 398
Configuring a Protected Port 398
Monitoring Protected Ports 400
Where to Go Next 400
Additional References 400
Feature Information 401
Finding Feature Information 401
Information About Port Blocking 402
Port Blocking 402
How to Configure Port Blocking 402
Blocking Flooded Traffic on an Interface 402
Monitoring Port Blocking 404
Where to Go Next 404
Additional References 404
Feature Information 405
Prerequisites for Port Security 406
Restrictions for Port Security 406
Information About Port Security 406
Port Security 406
Types of Secure MAC Addresses 406
Sticky Secure MAC Addresses 407
Security Violations 407
Port Security Aging 408
Port Security and Switch Stacks 408
Default Port Security Configuration 409
Port Security Configuration Guidelines 409
Overview of Port-Based Traffic Control 411
How to Configure Port Security 411
Enabling and Configuring Port Security 411
Enabling and Configuring Port Security Aging 415
Finding Feature Information 417
Information About Storm Control 418
Storm Control 418
How Traffic Activity is Measured 418
Traffic Patterns 419
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01 xvii
Contents