hit counter script

Configuring Port Security; Understanding Port Security - Cisco WS-C3560-48PS-S Software Configuration Manual

Software configuration guide
Hide thumbs Also See for WS-C3560-48PS-S:
Table of Contents

Advertisement

Chapter 20
Configuring Port-Based Traffic Control
This example shows how to block unicast and multicast flooding on a port:
Switch# configure terminal
Switch(config)# interface gigabitethernet0/1
Switch(config-if)# switchport block multicast
Switch(config-if)# switchport block unicast
Switch(config-if)# end

Configuring Port Security

You can use the port security feature to restrict input to an interface by limiting and identifying MAC
addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure
port, the port does not forward packets with source addresses outside the group of defined addresses. If
you limit the number of secure MAC addresses to one and assign a single secure MAC address, the
workstation attached to that port is assured the full bandwidth of the port.
If a port is configured as a secure port and the maximum number of secure MAC addresses is reached,
when the MAC address of a station attempting to access the port is different from any of the identified
secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address
configured or learned on one secure port attempts to access another secure port, a violation is flagged.
These sections include port security configuration information and procedures:

Understanding Port Security

This section contains information about these topics:
78-16156-01
Understanding Port Security, page 20-7
Default Port Security Configuration, page 20-10
Configuration Guidelines, page 20-10
Enabling and Configuring Port Security, page 20-11
Enabling and Configuring Port Security Aging, page 20-14
Secure MAC Addresses, page 20-8
Security Violations, page 20-9
Catalyst 3560 Switch Software Configuration Guide
Configuring Port Security
20-7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents