Cisco Cisco SG200-26P 26-port Gigabit PoE Smart Switch Manuale Di Manutenzione
Security
SSH Key Management
Cisco Small Business SF200E Series Advanced Smart Switch
169
10
-
Forward—Packets are forwarded, but the source MAC addresses are
not added to the forwarding database.
not added to the forwarding database.
-
Shutdown—Packets are discarded and the port is shut down.
•
Trap Frequency—Specify the number of seconds between traps when a
locked port receives incoming packets that are not allowed on the port. This
field displays only when the Action of Violation field is set to Discard with
Trap.
locked port receives incoming packets that are not allowed on the port. This
field displays only when the Action of Violation field is set to Discard with
Trap.
•
Convert dynamic addresses to static—Select Enable to convert all
dynamic secure MAC addresses to static secure MAC addresses.
dynamic secure MAC addresses to static secure MAC addresses.
•
Reset Port—Select to reset the port if it has been shut down by the Port
Security feature.
Security feature.
STEP 4
Click Apply and then click Close. Your changes are saved to the Running
Configuration.
Configuration.
Viewing and Configuring Secure MAC Addresses
To view the current list of secure MAC addresses, associated ports, and VLANs,
click Secure Address Table on the Port Security page.
click Secure Address Table on the Port Security page.
For each interface, the Secure Address Table lists each secured statically
configured MAC address, regardless of the locked or unlocked status of the port.
The table also lists dynamically learned MAC addresses for locked ports. Dynamic
entries for a port are cleared when the port is changed from locked to unlocked or
when the link goes down.
configured MAC address, regardless of the locked or unlocked status of the port.
The table also lists dynamically learned MAC addresses for locked ports. Dynamic
entries for a port are cleared when the port is changed from locked to unlocked or
when the link goes down.
You can click Static Address Table to display the page for configuring static
addresses. See
addresses. See
. Be sure to set the Status
field for the entry to Secure.
You can click Port Security Table to redisplay the Port Security page.
SSH Key Management
The command line interface (CLI) for switch management can be accessed by
using the Secure Shell (SSH) protocol. SSH clients and servers use keys to
encrypt authentication and session data for secure communication.
using the Secure Shell (SSH) protocol. SSH clients and servers use keys to
encrypt authentication and session data for secure communication.