![]() You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the workstations that are allowed to access the port. Displaying Port Security Settings Overview of Port Security.Port Security Guidelines and Restrictions.Refer to the Catalyst 4500 Series Switch Cisco IOS Command Reference and related publications at this location: If the command is not found in the Catalyst 4500 Command Reference, it will be found in the larger Cisco IOS library. Note For complete syntax and usage information for the switch commands used in this chapter, first look at the Cisco Catalyst 4500 Series Switch Command Reference and related publications at this location: It provides guidelines, procedures, and configuration examples. This chapter describes how to configure port security on Catalyst 4500 series switches. Configuring NetFlow Statistics Collection.Environment Monitoring and Power Management.Port Unicast and Multicast Flood Blocking.Understanding and Configuring Dynamic ARP Inspection.Configuring DHCP Snooping and IP Source Guard.Understanding and Configuring 802.1X Port-Based Authentication.Understanding and Configuring IP Multicast.Configuring 802.1Q and Layer 2 Protocol Tunneling.Configuring IGMP Snooping and Filtering.Understanding and Configuring EtherChannel. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |