EasyManuals Logo
Home>SMC Networks>Switch>TigerSwitch

SMC Networks TigerSwitch User Manual

Default Icon
518 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #348 background imageLoading...
Page #348 background image
C
OMMAND
L
INE
I
NTERFACE
4-106
Example
Port Security Commands
These commands can be used to enable port security on a port. When
using port security, the switch stops learning new MAC addresses on the
specified port when it has reached a configured maximum number. Only
incoming traffic with source addresses already stored in the dynamic or
static address table for this port will be authorized to access the network.
The port will drop any incoming frames with a source MAC address that is
unknown or has been previously learned from another port. If a device
with an unauthorized MAC address attempts to use the switch port, the
intrusion will be detected and the switch can automatically take action by
disabling the port and sending a trap message.
Console#show tacacs-server
Remote TACACS server configuration:
Server IP address: 10.11.12.13
Communication key with TACACS server: *****
Server port number: 49
Console#
Table 4-31 Port Security Commands
Command Function Mode Page
port security Configures a secure port IC 4-107
mac-address-table
static
Maps a static address to a port in a VLAN GC 4-179
show
mac-address-table
Displays entries in the bridge-forwarding
database
PE 4-181

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the SMC Networks TigerSwitch and is the answer not in the manual?

SMC Networks TigerSwitch Specifications

General IconGeneral
BrandSMC Networks
ModelTigerSwitch
CategorySwitch
LanguageEnglish

Related product manuals