EasyManua.ls Logo

Cisco Catalyst 4500 Series - Guidelines and Restrictions

Cisco Catalyst 4500 Series
2086 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
56-6
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 56 Configuring Auto Security
Guidelines and Restrictions
Auto Security CLIs applied on Trunk Port:
-----------------------------------------
ip dhcp snooping trust
ip arp inspection trust
switchport port-security
switchport port-security maximum 100
switchport port-security violation restrict
Sample Output when Auto Security is Enabled
This example shows the output of the show auto security command when AS is enabled:
Switch# show auto security
Auto Security is Enabled globally
AutoSecure is Enabled on below interface(s):
--------------------------------------------
GigabitEthernet1/0/2
GigabitEthernet1/0/3
GigabitEthernet1/0/14
Sample Output when Auto Security is Disabled
This example shows the output of the show auto security command when AS is disabled:
Switch# show auto security
Auto Security is Disabled globally
AutoSecure is Enabled on below interface(s):
--------------------------------------------
none
Switch#
Guidelines and Restrictions
The auto security command has no parameters.
Base line security CLIs (like port security) are not individually nvgen’d on interfaces that have auto
security-port configured. This allows you to maintain consistency over reboots.
After auto security-port is enabled on a port, you cannot change the CLIs of the baseline security
features (Port Security, DAI, and DHCP Snooping).
For example, if you enter the following:
interface GigabitEthernet2/0/24
switchport mode access
auto security-port host
The port security configuration is rejected on the auto security port:
Switch(config)# int g2/0/24
Switch(config-if)# switchport port-security maximum 4
%Command Rejected: 'auto security' enabled port
Because you might need a different set of features on uplink ports, such as marking the port as a
DHCP trusted port, you need to identify uplink and downlink ports and apply port mode specific
configuration.

Table of Contents

Other manuals for Cisco Catalyst 4500 Series

Related product manuals