6-30
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
OL-30644-01
Chapter6 Configuring Radio Settings
Enabling and Disabling Public Secure Packet Forwarding
Configuring Protected Ports
To prevent communication between client devices associated with different access points on your
wireless LAN, you can set up protected ports on the switch to which the wireless devices are connected.
Alternatively, you should isolate ports on the same switch that leads to APs between which you do not
want communication to occur.
Beginning in privileged EXEC mode, follow these steps to define a port on your switch as a protected
port:
To disable protected port, use the no switchport protected interface configuration command. This
command is only valid at an individual switch level. It does not isolate APs connected to different
switches. You can use this command on ports to all APs on a given switch among which you do not want
communication to occur. Alternatively, you can use private VLAN configuration for the AP.
Note When using wireless domain services (WDS), make sure not to block communication between the APs
and their WDS.
For detailed information on configuring private VLANs and on protected ports and port blocking, see
the Catalyst 3750 Software Configuration Guide, at the following URL:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/12-2_55_se/configur
ation/guide/scg3750.html
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 interface interface-id Enter interface configuration mode, and enter the type and
number of the switchport interface to configure, such as
gigabitethernet0/1.
Step3 switchport protected Configure the interface to be a protected port.
Step4 end Return to privileged EXEC mode.
Step5 show interfaces interface-id
switchport
Verify your entries.
Step6 copy running-config startup-config (Optional) Save your entries in the configuration file.