SMC Networks TIGERSWITCH SMC6752AL2 User Manual

Page 114

Advertising
background image

C

ONFIGURING

THE

S

WITCH

3-66

already in the address table will be retained and will not age out. Any other
device that attempts to use the port will be prevented from accessing the
switch.

Command Usage

A secure port has the following restrictions:
- It cannot use port monitoring.
- It cannot be a multi-VLAN port.
- It cannot be used as a member of a static or dynamic trunk.
- It should not be connected to a network interconnection device.

The default maximum number of MAC addresses allowed on a secure
port is zero. You must configure a maximum address count from
1 - 1024 for the port to allow access.

If a port is disabled (shut down) due to a security violation, it must be
manually re-enabled from the Port/Port Configuration page
(page 3-90).

Command Attributes

Port – Port number.

Name – Descriptive text (page 4-145).

Action – Indicates the action to be taken when a port security violation
is detected:
- None: No action should be taken. (This is the default.)
- Trap: Send an SNMP trap message.
- Shutdown: Disable the port.
- Trap and Shutdown: Send an SNMP trap message and disable the

port.

Security Status – Enables or disables port security on the port.
(Default: Disabled)

Max MAC Count – The maximum number of MAC addresses that
can be learned on a port. (Range: 0 - 1024)

Trunk – Trunk number if port is a member (page 3-94 and 3-96).

Advertising