Contents
xxxvii
Software Configuration Guide—Release IOS XE 3.3.0SG and IOS 15.1(1)SG
OL-25340-01
Configuring the Web-Based Authentication Parameters 46-13
Removing Web-Based Authentication Cache Entries 46-14
Displaying Web-Based Authentication Status 46-14
CHAPTER
47 Configuring Port Security 47-1
Port Security Commands 47-2
About Port Security 47-3
Secure MAC Addresses 47-4
Maximum Number of Secure MAC Addresses 47-4
Aging Secure MAC Addresses 47-5
Sticky Addresses on a Port 47-5
Violation Actions 47-6
Invalid Packet Handling 47-7
Configuring Port Security on Access Ports 47-7
Configuring Port Security on Access Ports 47-7
Examples of Port Security on Access Ports 47-10
Example 1: Setting Maximum Number of Secure Addresses 47-11
Example 2: Setting a Violation Mode 47-11
Example 3: Setting the Aging Timer 47-11
Example 4: Setting the Aging Timer Type 47-12
Example 5: Configuring a Secure MAC Address 47-12
Example 6: Configuring Sticky Port Security 47-13
Example 7: Setting a Rate Limit for Bad Packets 47-13
Example 8: Clearing Dynamic Secure MAC Addresses 47-14
Configuring Port Security on PVLAN Ports 47-14
Configuring Port Security on an Isolated Private VLAN Host Port 47-14
Example of Port Security on an Isolated Private VLAN Host Port 47-16
Configuring Port Security on a Private VLAN Promiscuous Port 47-16
Example of Port Security on a Private VLAN Promiscuous Port 47-17
Configuring Port Security on Trunk Ports 47-17
Configuring Trunk Port Security 47-17
Examples of Trunk Port Security 47-19
Example 1: Configuring a Maximum Limit of Secure MAC Addresses for All VLANs 47-19
Example 2: Configuring a Maximum Limit of Secure MAC Addresses for Specific VLANs 47-20
Example 3: Configuring Secure MAC Addresses in a VLAN Range 47-20
Trunk Port Security Configuration Guidelines and Restrictions 47-21
Port Mode Changes 47-22
Configuring Port Security on Voice Ports 47-22
Configuring Port Security on Voice Ports 47-23