beautypg.com

Cli: configuring port security, Cli: configuring port security -15 – SMC Networks SMC TigerStack II SMC6624M User Manual

Page 135

background image

7-15

Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access

Configuring and Monitoring Port Security

Usi
n

g P
a

sswo

rds,
P

o

rt

S

ecu

ri

ty

, an
d A
u

th

or

iz

ed
I

P

Figure 7-5. Example of the Port Security Configuration Display for a Single Port

The following command example shows the option for entering a range of
ports, including a series of non-contiguous ports. Note that no spaces are
allowed in the port number portion of the command string:

SMC TigerSwitch 10/100(config)# show port-security 1-

3,6,8

CLI: Configuring Port Security

Using the CLI, you can:

Configure port security and edit security settings.

Add or delete devices from the list of authorized addresses for one or
more ports.

Clear the Intrusion flag on specific ports

Syntax:

port-security

[learn-mode continuous]
[learn-mode static]

[address-limit ]
[mac-address ] [<mac-addr> . . . <mac-addr>]

[action ]
[clear-intrusion-flag]

no port-security mac-address <mac-addr> [<mac-addr> . . .

<mac-addr>]

For information on the individual control parameters, see the Port Security
Parameter tables on pages 7-12 and 7-13.