Specifies the VLAN as the primary private VLAN
This table lists the commands most commonly used with Port Security.Įrrdisable recovery cause psecure-violationīrings a secure port out of error-disabled stateĬustomizes the time to recover from a specified error disable causeĬonfigures all secure MAC addresses on each VLANĬonfigures a maximum number of MAC addresses on an interfaceĬonfiguring Port Security on Access PortsĬreates an association between a secondary VLAN and a primary VLANĮxample of Port Security on an Isolated Private VLAN Host PortĬonfiguring Port Security on an Isolated Private VLAN Host Port Refer to the Catalyst 4500 Series Switch Cisco IOS Command Reference and related publications at this location: If the command is not found in the Catalyst 4500 Command Reference, it is located in the larger Cisco IOS library.
Note For complete syntax and usage information for the switch commands used in this chapter, look at the Cisco Catalyst 4500 Series Switch Command Reference and related publications at this location:
It provides an overview of port security on the Catalyst 4500 series switch and details the configuration on various types of ports such as access, voice, trunk and private VLAN (PVLAN).
This chapter describes how to configure port security on the Catalyst 4500 series switch.
Configuring 802.1X Port-Based Authentication.Configuring Unicast Reverse Path Forwarding.Configuring 802.1Q and Layer 2 Protocol Tunneling.Configuring IGMP Snooping and Filtering.Configuring Resilient Ethernet Protocol.
Configuring Flex Links and the MAC Address-Table Move Update Feature.Configuring Layer 2 Ethernet Interfaces.Configuring the Catalyst 4500 Series Switch with Cisco Network Assistant.Environmental Monitoring and Power Management.Configuring Cisco NSF with SSO Supervisor Engine Redundancy.Configuring Supervisor Engine Redundancy Using RPR and SSO.