![]() |
Table Of Contents
Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
Prerequisites for Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
Restrictions for Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
Information About Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
How the Protected Port Feature Works
How to Configure Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
Feature Information for Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
First Published: June 28, 2007Last Updated: June 28, 2007This feature allows you to configure protected port security on all modular platforms with installed 4- or 9-port high-speed WAN interface card (HWIC) modules. Some applications require that no traffic be forwarded between ports on the same device so that one neighbor does not see the traffic generated by another neighbor. In such an environment, the use of protected ports ensures that there is no exchange of unicast, broadcast, or multicast traffic between these ports on the device.
Finding Feature Information in This Module
Your Cisco IOS software release may not support all of the features documented in this module. To reach links to specific feature documentation in this module and to see a list of the releases in which each feature is supported, use the "Feature Information for Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers" section.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Contents
•
Prerequisites for Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
•
Restrictions for Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
•
Information About Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
•
How to Configure Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
•
Feature Information for Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
Prerequisites for Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
The following Integrated Services Routers (ISRs) support the protected port feature:
•
Cisco 1841ISR
•
Cisco 2800 series ISRs, including models 2801, 2811, 2821, and 2851
•
Cisco 3800 series ISRs, including models 3825 and 3845
To support the protected port feature, the Cisco routers listed above must be equipped with one of the following HWICs:
•
HWIC-4ESW
•
HWIC-D-9ESW
Restrictions for Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
The protected port feature can be configured only on the switch ports attached to the specified HWICs installed in a supported Cisco ISR.
Information About Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
Before configuring the protected port feature on a router, you should understand the following concept:
•
How the Protected Port Feature Works
How the Protected Port Feature Works
Some applications require that no traffic is forwarded between ports on the same switch so that one neighbor does not see the traffic generated by another neighbor. In such an environment, the use of protected ports ensures that there is no exchange of unicast, broadcast, or multicast traffic between these ports on the switch.
Protected ports have these features:
•
A protected port does not forward any traffic (unicast, multicast, or broadcast) to any other port that is also a protected port. Traffic cannot be forwarded between protected ports at Layer 2; all traffic passing between protected ports must be forwarded through a Layer 3 device.
•
Forwarding behavior between a protected port and a nonprotected port proceeds as usual.
The default is to have no protected ports defined.
How to Configure Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
This section explains how to configure the protected port feature on the 4- and 9-port HWICs in a modular ISR.
Restrictions
The protected port feature can be configured only on the switch ports attached to the specified HWICs in a Cisco ISR.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
interface [interface id]
4.
switchport protected
5.
end
DETAILED STEPS
Configuration Examples for Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
This example shows how to configure Fast Ethernet interface 0/3 as a protected port and verify the configuration:
Router# configure terminalRouter(config)# interface fastethernet0/3Router(config-if)# switchport protectedRouter(config-if)# endRouter# show interface fastethernet0/3 switchportName: Gi0/3Switchport: EnabledAdministrative Mode: static accessOperational Mode: downAdministrative Trunking Encapsulation: dot1qNegotiation of Trunking: DisabledAccess Mode VLAN: 1 (default)Trunking Native Mode VLAN: 1 (default)Trunking VLANs Enabled: ALLTrunking VLANs Active: noneProtected: truePriority for untagged frames: 0Override vlan tag priority: FALSEVoice VLAN: noneAppliance trust: noneRouter#Router# show running interface fastethernet0/3/0
Building configuration...Current configuration : 57 bytes!interface FastEthernet0/3/0switchport protectedendAdditional References
The following sections provide references related to the protected port on 4- and 9-Port HWICs on Modular Integrated Services Routers feature.
Related Documents
Related Topic Document TitleConfiguring a EtherSwitch HWICs
"Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards" chapter in the Cisco IOS LAN Switching Configuration Guide, Release 12.4
Cisco IOS Command Reference
Standards
Standard TitleNo new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
—
MIBs
RFCs
RFC TitleNo new or modified RFCs are supported by this feature, and support for existing RFCs has not been modified by this feature.
—
Technical Assistance
Command Reference
This section documents only commands that are new or modified.
switchport protected
Use the switchport protected command to isolate unicast, multicast, and broadcast traffic at Layer 2 from other protected ports on the same switch in interface configuration mode. To disable protection on the port, use the no form of the command.
switchport protected
no switchport protected
Syntax Description
This command has no arguments or keywords.
Command Default
No protected port is defined. All ports are nonprotected.
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
The switchport protection feature is local to the switch; communication between protected ports on the same switch is possible only through a Layer 3 device. To prevent communication between protected ports on different switches, you must configure the protected ports for unique VLANs on each switch and configure a trunk link between the switches.
Beginning with Cisco IOS Release 12.4(15)T, the following Cisco ISRs support port protection when an appropriate high-speed WAN interface card (HWIC) is installed:
•
Cisco 1841 ISR
•
Cisco 2800 Series ISRs, including models 2801, 2811, 2821, and 2851
•
Cisco 3800 Series ISRs, including models 3825 and 3845
To support port protection, the Cisco routers listed above must be equipped with one of the following HWICs:
•
HWIC-4ESW
•
HWIC-D-9ESW
Note
Only the ports attached to the HWICs can be configured with port protection.
A protected port does not forward any unicast, multicast, or broadcast traffic to any other protected port. A protected port continues to forward unicast, multicast, and broadcast traffic to unprotected ports and vice versa.
Port monitoring does not work if both the monitor and monitored ports are protected ports.
A protected port is different from a secure port.
Examples
The following example shows how to enable a protected port on an interface:
Switch(config)# interface gigabitethernet0/3Switch(config-if)# switchport protectedYou can verify the previous command by entering the show interfaces switchport privileged EXEC command.
Related Commands
Feature Information for Protected Port on EtherSwitch HWICs on Modular Integrated Services Routers
Table 1 lists the release history for this feature.
Not all commands may be available in your Cisco IOS software release. For release information about a specific command, see the command reference documentation.
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which Cisco IOS and Catalyst OS software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note
Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2007 Cisco Systems, Inc. All rights reserved.