Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access Configuring and Monitoring Port Security

CLI: Port Security Command Options and Operation

Port Security Commands Used in This Section

 

 

show port-security

page 7-16: “CLI: Displaying Current Port Security Settings”

 

 

port-security

page 7-17: “CLI: Configuring Port Security”

 

 

<[ethernet] port-list>

page 7-17: “CLI: Configuring Port Security”

 

 

[learn-mode continuous]

page 7-18: “Adding an Authorized Device to a Port”

 

 

[learn-mode static]

page 7-18: “Adding an Authorized Device to a Port”

 

 

[address-limit]

page 7-18: “Adding an Authorized Device to a Port”

 

 

[mac-address]

page 7-18: “Adding an Authorized Device to a Port”

 

 

[action]

page 7-18: “Adding an Authorized Device to a Port”

 

 

no port-security

page 7-20: “Removing a Device From the “Authorized” List for

 

 

 

a Port”

 

 

[clear-intrusion-flag]

page 7-25: “CLI: Checking for Intrusions, Listing Intrusion

 

 

 

Alerts, and Resetting Alert Flags”

 

 

 

 

This section describes the CLI port security command and how the switch

 

acquires and maintains authorized addresses.

 

 

 

N o t e

Use the global configuration level to execute port-security configuration

 

commands.

 

 

 

 

 

Authorized and Security,

Port Passwords, Using

IP

 

 

 

7-13