Cli: configuring port security, Cli: configuring port security -15 – SMC Networks SMC TigerStack II SMC6624M User Manual
Page 135

7-15
Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access
Configuring and Monitoring Port Security
Usi
n
g P
a
sswo
rds,
P
o
rt
S
ecu
ri
ty
, an
d A
u
th
or
iz
ed
I
P
Figure 7-5. Example of the Port Security Configuration Display for a Single Port
The following command example shows the option for entering a range of
ports, including a series of non-contiguous ports. Note that no spaces are
allowed in the port number portion of the command string:
SMC TigerSwitch 10/100(config)# show port-security 1-
3,6,8
CLI: Configuring Port Security
Using the CLI, you can:
■
Configure port security and edit security settings.
■
Add or delete devices from the list of authorized addresses for one or
more ports.
■
Clear the Intrusion flag on specific ports
Syntax:
port-security
[learn-mode continuous]
[learn-mode static]
[address-limit
[mac-address
[action
[clear-intrusion-flag]
no port-security
<mac-addr>]
For information on the individual control parameters, see the Port Security
Parameter tables on pages 7-12 and 7-13.