知识库

How to configure MAC based port security on Dell N2000, N3000, and N4000 series switches.


Article Summary: This article shows how to configure MAC based port security on Dell N Series switches



Table of Contents

  1. How to enable MAC based port security on the N Series Switch
  2. How to statically add MAC address to an Interface
  3. How to configure a maximum amount of allowed MAC addresses
  4. How to configure the maximum limit of dynamically learned mac addresses on a specific interface

How to enable MAC based port security on the N series switch

Command Parameters
console>enable Enter enable Privilege Exec mode.
console#config Enter configuration mode.
console(config)#switchport port-security Enable port security globally on the switch.
console(config)#interface gi1/0/5 Enter specific interface that needs port security.
console(config-if-gi1/0/5)#switchport port-security Enable port security on the interface level.

Note: When port security is enabled on an interface, all dynamic MAC addresses learned on that port are removed, and the port re-learns any MAC addresses on that interface.


How to statically add MAC addresses to an interface

Command Parameters
console#config Enter configuration mode.
console(config)# mac address-table static c2f3.220a.12f4 vlan 1 interface gi1/0/5 This adds the MAC address c2f3.220a.12f4 to the MAC table for interface gi1/0/5.
console(config)#no mac address-table static c2f3.220a.12f4 vlan 1 interface gi1/0/5 Add "no" to the beginning of the command to remove the MAC address.



How to configure a maximum amount of allowed Static MAC addresses

Command Parameters
console#config Enter configuration mode.
console(config)#interface gi1/0/5 Enter specific interface that needs port security.
console(config-if-Gi1/0/5)#switchport port-security maximum 3 Sets the max limit of static MAC addresses to 3. Range is <0-100> Default is 100.

Note: To clear dynamically learned MAC addresses from a port, you must perform the following example command.
console#clear mac address-table dynamic interface gi1/0/5

Note: By default when port security violations occur, the port discards any frames on that interface originating from violating MAC addresses. The port is not shut down. If you are wanting the port to actually shut down you will need to add this command to the specific interfaces that require that feature:
(config-if-Gi1/0/5)#switchport port-security violation shutdown :


How to configure the maximum limit of dynamically learned mac addresses on a specific interface

Command Parameters
console#config Enter configuration mode.
console(config)#interface gi1/0/5 Enter specific interface that needs port security.
console(config-if-gi1/0/5)#switchport port-security dynamic 0 This example uses 0 as you would normally want the port not to learn macs dynamically. Range is <0-600> Default is 100.






文章ID: HOW10392

上次修改日期: 06/23/2017 09:20 AM


评价此文章

准确性
有用性
易理解性
这篇文章对您有帮助吗?
向我们发送反馈
注释中不得包含以下特殊字符:<>()\
抱歉,我们的反馈系统目前发生故障。请稍后重试。

感谢您提供反馈。