How to Configure Protected Ports 331
Configuring a Protected Port 331
Monitoring Protected Ports 333
Where to Go Next 333
Information About Port Blocking 333
Port Blocking 333
How to Configure Port Blocking 333
Blocking Flooded Traffic on an Interface 333
Monitoring Port Blocking 335
Prerequisites for Port Security 335
Restrictions for Port Security 335
Information About Port Security 336
Port Security 336
Types of Secure MAC Addresses 336
Sticky Secure MAC Addresses 336
Security Violations 337
Port Security Aging 338
Port Security and Switch Stacks 338
Default Port Security Configuration 338
Port Security Configuration Guidelines 339
How to Configure Port Security 340
Enabling and Configuring Port Security 340
Enabling and Configuring Port Security Aging 344
Monitoring Port Security 346
Configuration Examples for Port Security 347
Information About Protocol Storm Protection 347
Protocol Storm Protection 347
Default Protocol Storm Protection Configuration 348
How to Configure Protocol Storm Protection 348
Enabling Protocol Storm Protection 348
Monitoring Protocol Storm Protection 349
CHAPTER 18
Configuring IPv6 First Hop Security 351
Prerequisites for First Hop Security in IPv6 351
Restrictions for First Hop Security in IPv6 351
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
xvi OL-29434-01
Contents