EasyManuals Logo

Cisco Catalyst 4500 Series Software Configuration Guide

Cisco Catalyst 4500 Series
2086 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1471 background imageLoading...
Page #1471 background image
55-9
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 55 Configuring Port Security
Configuring Port Security on Access Ports
Step 7
Switch(config-if)# [no] switchport port-security
violation {restrict | shutdown | shutdown vlan}
(Optional) Sets the violation mode, the action to be taken
when a security violation is detected, as one of these:
restrict—A port security violation restricts data and
causes the SecurityViolation counter to increment
and send an SNMP trap notification.
shutdown—The interface is error-disabled when a
security violation occurs.
shutdown vlan—Use to set the security violation
mode for each VLAN. In this mode, the VLAN is
error-disabled instead of the entire port when a
violation occurs.
Note When a secure port is in the error-disabled state,
you can bring it out of this state by entering the
errdisable recovery cause psecure-violation
global configuration command or you can
manually reenable it by entering the shutdown
and no shut down interface configuration
commands.
To return the violation mode to the default condition
(shutdown mode), use the
no switchport port-security violation shutdown
command.
Step 8
Switch(config-if)# switchport port-security limit
rate invalid-source-mac packets_per_sec
Sets the rate limit for bad packets.
Default is 10 pps.
Step 9
Switch(config-if)# [no] switchport port-security
mac-address mac_address
(Optional) Enters a secure MAC address for the interface.
You can use this command to configure a secure MAC
addresses. If you configure fewer secure MAC addresses
than the maximum, the remaining MAC addresses are
dynamically learned.
To delete a MAC address from the address table, use the
no switchport port-security mac-address mac_address
command.
Note This command only applies to access, PVLAN
host, and PVLAN promiscuous mode. For more
details on PVLAN, trunk, or regular trunk mode,
refer to the “Configuring Port Security on Trunk
Ports” section on page 55-17.
Step 10
Switch(config-if)# [no] switchport port-security
mac-address sticky
(Optional) Enables sticky learning on the interface.
To disable sticky learning on an interface, use the
no switchport port-security mac-address sticky
command. The interface converts the sticky secure MAC
addresses to dynamic secure addresses.
Command Purpose

Table of Contents

Other manuals for Cisco Catalyst 4500 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 4500 Series and is the answer not in the manual?

Cisco Catalyst 4500 Series Specifications

General IconGeneral
SeriesCatalyst 4500 Series
CategorySwitch
Layer SupportLayer 2, Layer 3
Form FactorModular chassis
StackableNo
Chassis Slots3, 6, 7, 10
Power Supply OptionsAC, DC
RedundancyPower supply, Supervisor engine
Network ManagementCisco IOS Software CLI, SNMP, Cisco Prime Infrastructure
FeaturesSecurity, QoS
Port DensityUp to 384 ports per chassis
Security Features802.1X, ACLs, DHCP Snooping, Dynamic ARP Inspection, IP Source Guard
Supervisor Engine8-E

Related product manuals