A SERVICE OF

logo

7
Configuring and Monitoring Port Security
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Basic Operation
Blocking Unauthorized Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Trunk Group Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
Planning Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
Port Security Command Options and Operation
Retention of Static Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8
Displaying Current Port Security Settings . . . . . . . . . . . . . . . . . . . . . . . 7-9
Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10
Web: Displaying and Configuring Port Security Features . . . . . . . 7-15
Reading Intrusion Alerts and Resetting Alert Flags
Notice of Security Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15
How the Intrusion Log Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-16
Keeping the Intrusion Log Current by Resetting Alert Flags . . . . . . . 7-17
Menu: Checking for Intrusions, Listing Intrusion Alerts, and
Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17
CLI: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert
Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-19
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . 7-21
Web: Checking for Intrusions, Listing Intrusion Alerts, and Resetting 
Alert Flags
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22;
7-1