SMC Networks SMC TigerStack II SMC6624M User Manual

Page 139

Advertising
background image

7-19

Using Passwords, Port Security, and Authorized IP Managers To Protect Against Unauthorized Access

Configuring and Monitoring Port Security

Usi
n

g P
a

sswo

rds,
P

o

rt

S

ecu

ri

ty

, an
d A
u

th

or

iz

ed
I

P

N o t e

You can reduce the address limit below the number of currently authorized
addresses on a port. This enables you to subsequently remove a device from
the “Authorized” list without opening the possibility for an unwanted device
to automatically become authorized.

For example, suppose port 1 is configured as shown below and you want to
remove 0c0090-123456 from the Authorized Address list:

The following command serves this purpose by removing 0c0090-123456 and
reducing the Address Limit to 1:

SMC TigerSwitch 10/100(config) # port-security 1 address-

limit 1

SMC TigerSwitch 10/100(config) # no port-security 1 mac-

address 0c0090-123456

The above command sequence results in the following configuration for port 1:

When removing 0c0090-123456, first
reduce the Address Limit by 1 to prevent
the port from automatically adding
another device that it detects on the
network.

Advertising