User Tools

Site Tools


icnd1:switchport_security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
icnd1:switchport_security [2024/05/09 07:26]
114.119.145.194 old revision restored (2023/11/05 23:33)
icnd1:switchport_security [2024/05/09 11:55] (current)
114.119.138.183 old revision restored (2023/12/01 12:00)
Line 3: Line 3:
 An attempt at securing the physical ports on cisco switches by denying access based on the MAC address of the connected device. Each port has it's own collection of acceptable MAC addresses with which to permit traffic that can be automatically or manually specified as well as the action taken upon violation of the switchport sec configuration. An attempt at securing the physical ports on cisco switches by denying access based on the MAC address of the connected device. Each port has it's own collection of acceptable MAC addresses with which to permit traffic that can be automatically or manually specified as well as the action taken upon violation of the switchport sec configuration.
  
-====Violation Actions:====+Violation Actions:
   ***Shutdown** (**DEFAULT**)   ***Shutdown** (**DEFAULT**)
     * Port shuts down immediately. When in error-disabled-state you can ressurect the port with errdisable recovery cause psecure-violation (global config) OR manually toggle up status on the interface with shutdown, no shutdown (int config).     * Port shuts down immediately. When in error-disabled-state you can ressurect the port with errdisable recovery cause psecure-violation (global config) OR manually toggle up status on the interface with shutdown, no shutdown (int config).
icnd1/switchport_security.txt ยท Last modified: 2024/05/09 11:55 by 114.119.138.183