EasyManuals Logo
Home>Cisco>Switch>Catalyst 250 Series

Cisco Catalyst 250 Series User Manual

Cisco Catalyst 250 Series
498 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #439 background imageLoading...
Page #439 background image
PurposeCommand or Action
Returns to privileged EXEC mode.end
Example:
Switch(config)# end
Step 12
Verifies your entries.show port-security
Example:
Switch# show port-security
Step 13
Verifies your entries.show running-config
Example:
Switch# show running-config
Step 14
(Optional) Saves your entries in the configuration file.copy running-config startup-config
Example:
Switch# copy running-config
Step 15
startup-config
Related Topics
Port Security, on page 368
Port Security, on page 406
Configuration Examples for Port Security, on page 432
Enabling and Configuring Port Security Aging
Use this feature to remove and add devices on a secure port without manually deleting the existing secure
MAC addresses and to still limit the number of secure addresses on a port. You can enable or disable the
aging of secure addresses on a per-port basis.
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01 415
Configuring Port-Based Traffic Control
Enabling and Configuring Port Security Aging

Table of Contents

Other manuals for Cisco Catalyst 250 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 250 Series and is the answer not in the manual?

Cisco Catalyst 250 Series Specifications

General IconGeneral
BrandCisco
ModelCatalyst 250 Series
CategorySwitch
LanguageEnglish

Related product manuals