Configuring and Monitoring Port Security
Port Security Command Options and Operation
Configuring Port Security
Using the CLI, you can:
■ Configure port security and edit security settings.
■ Add or delete devices from the list of authorized addresses for one or more
ports.
■ Clear the Intrusion flag on specific ports
Syntax: port-security
[e] <port-list>< learn-mode | address-limit | mac-address | action |
clear-intrusion-flag >
<port-list>: Specifies a list of one or more ports to which
the port-security command applies.
learn-mode < continuous | static | port-access | configured | limited-
continuous >
Specifies how the port acquires authorized addresses:
continuous
(Default): Appears in the factory-default setting
or when you execute no port-security
. Allows the port to learn
addresses from inbound traffic from any device(s) to
which it is connected. In this state, the port accepts traffic
from any device(s) to which it is connected. Addresses
learned in the learn continuous mode will “age out” and
be automatically deleted if they are not used regularly. The
default age time is five minutes.
9-8