Contents
xxxv
Software Configuration Guide—Release 15.0(2)SG
OL-23818-01
Example 7: Setting a Rate Limit for Bad Packets 43-13
Example 8: Clearing Dynamic Secure MAC Addresses 43-14
Configuring Port Security on PVLAN Ports 43-14
Configuring Port Security on an Isolated Private VLAN Host Port 43-14
Example of Port Security on an Isolated Private VLAN Host Port 43-16
Configuring Port Security on a Private VLAN Promiscuous Port 43-16
Example of Port Security on a Private VLAN Promiscuous Port 43-17
Configuring Port Security on Trunk Ports 43-17
Configuring Trunk Port Security 43-17
Examples of Trunk Port Security 43-19
Example 1: Configuring a Maximum Limit of Secure MAC Addresses for All VLANs 43-19
Example 2: Configuring a Maximum Limit of Secure MAC Addresses for Specific VLANs 43-20
Example 3: Configuring Secure MAC Addresses in a VLAN Range 43-20
Trunk Port Security Configuration Guidelines and Restrictions 43-21
Port Mode Changes 43-22
Configuring Port Security on Voice Ports 43-22
Configuring Port Security on Voice Ports 43-23
Examples of Voice Port Security 43-25
Example 1: Configuring Maximum MAC Addresses for Voice and Data VLANs 43-25
Example 2: Configuring Sticky MAC Addresses for Voice and Data VLANs 43-26
Voice Port Security Configuration Guidelines and Restrictions 43-27
Displaying Port Security Settings 43-27
Examples of Security Settings 43-28
Example 1: Displaying Security Settings for the Entire Switch 43-28
Example 2: Displaying Security Settings for an Interface 43-29
Example 3: Displaying All Secure Addresses for the Entire Switch 43-29
Example 4: Displaying a Maximum Number of MAC Addresses on an Interface 43-30
Example 5: Displaying Security Settings on an Interface for a VLAN Range 43-30
Example 6: Displaying Secured MAC Addresses and Aging Information on an Interface 43-30
Example 7: Displaying Secured MAC Addresses for a VLAN Range on an Interface 43-31
Configuring Port Security with Other Features/Environments 43-31
DHCP and IP Source Guard 43-31
802.1X Authentication 43-32
Configuring Port Security in a Wireless Environment 43-32
Configuring Port Security over Layer 2 EtherChannel 43-33
Port Security Configuration Guidelines and Restrictions 43-33
CHAPTER
44 Configuring Control Plane Policing and Layer 2 Control Packet QoS 44-1
Configuring Control Plane Policing 44-1