EasyManuals Logo

Cisco Catalyst 4500 Series Software Configuration Guide

Cisco Catalyst 4500 Series
2086 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1502 background imageLoading...
Page #1502 background image
56-6
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 56 Configuring Auto Security
Guidelines and Restrictions
Auto Security CLIs applied on Trunk Port:
-----------------------------------------
ip dhcp snooping trust
ip arp inspection trust
switchport port-security
switchport port-security maximum 100
switchport port-security violation restrict
Sample Output when Auto Security is Enabled
This example shows the output of the show auto security command when AS is enabled:
Switch# show auto security
Auto Security is Enabled globally
AutoSecure is Enabled on below interface(s):
--------------------------------------------
GigabitEthernet1/0/2
GigabitEthernet1/0/3
GigabitEthernet1/0/14
Sample Output when Auto Security is Disabled
This example shows the output of the show auto security command when AS is disabled:
Switch# show auto security
Auto Security is Disabled globally
AutoSecure is Enabled on below interface(s):
--------------------------------------------
none
Switch#
Guidelines and Restrictions
• The auto security command has no parameters.
• Base line security CLIs (like port security) are not individually nvgen’d on interfaces that have auto
security-port configured. This allows you to maintain consistency over reboots.
• After auto security-port is enabled on a port, you cannot change the CLIs of the baseline security
features (Port Security, DAI, and DHCP Snooping).
For example, if you enter the following:
interface GigabitEthernet2/0/24
switchport mode access
auto security-port host
The port security configuration is rejected on the auto security port:
Switch(config)# int g2/0/24
Switch(config-if)# switchport port-security maximum 4
%Command Rejected: 'auto security' enabled port
• Because you might need a different set of features on uplink ports, such as marking the port as a
DHCP trusted port, you need to identify uplink and downlink ports and apply port mode specific
configuration.

Table of Contents

Other manuals for Cisco Catalyst 4500 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 4500 Series and is the answer not in the manual?

Cisco Catalyst 4500 Series Specifications

General IconGeneral
SeriesCatalyst 4500 Series
CategorySwitch
Layer SupportLayer 2, Layer 3
Form FactorModular chassis
StackableNo
Chassis Slots3, 6, 7, 10
Power Supply OptionsAC, DC
RedundancyPower supply, Supervisor engine
Network ManagementCisco IOS Software CLI, SNMP, Cisco Prime Infrastructure
FeaturesSecurity, QoS
Port DensityUp to 384 ports per chassis
Security Features802.1X, ACLs, DHCP Snooping, Dynamic ARP Inspection, IP Source Guard
Supervisor Engine8-E

Related product manuals