User Authentication
65
NXA-ENET24 - Software Management Guide
Command Usage
A secure port has the following restrictions:
Cannot use port monitoring.
Cannot be a multi-VLAN port.
It cannot be used as a member of a static or dynamic trunk.
It should not be connected to a network interconnection device.
If a port is disabled (shut down) due to a security violation, it must be manually re-enabled from the
Port/Port Configuration page (see the Port Configurationsection on page 85).
Command Attributes Configuring Port Security - Web
Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the
checkbox in the Status column to enable security for a port, set the maximum number of MAC addresses
allowed on a port, and click Apply.
Configuring Port Security - CLI
This example enables port security for Port 5 with the intrusion action to send a trap and disable the port, and
then sets the maximum addresses to learn on the port to 20.
Command Attributes
•Port: Port number.
• Name: Descriptive text.
• Action: Indicates the action to be taken when a port security violation is detected:
• None: No action should be taken. (This is the default.)
• Trap: Send an SNMP trap message.
• Shutdown: Disable the port.
• Trap and Shutdown: Send an SNMP trap message and disable the port.
• Security Status: Enables or disables port security on the port. (Default: Disabled)
• Max MAC Count: The maximum number of MAC addresses that can be learned on a port.
(Range: 0 -1024)
•Trunk: Trunk number if port is a member (see the Creating Trunk Groupssection on page88).
FIG. 61 Web - Configuring Port Security
FIG. 62 Web - Configuring Port Security