Authorization Scenarios
Assume that the port security feature is activated and the following conditions are specified in the active database:
- A pWWN (P1) is allowed access through interface fc1/1 (F1).
- A pWWN (P2) is allowed access through interface fc1/1 (F1).
- A nWWN (N1) is allowed access through interface fc1/2 (F2).
- Any WWN is allowed access through interface fc1/3 (F3).
- A nWWN (N3) is allowed access through any interface.
- A pWWN (P3) is allowed access through interface fc1/4 (F4).
- A sWWN (S1) is allowed access through interface fc1/10-13 (F10 to F13).
- A pWWN (P10) is allowed access through interface fc1/11 (F11).
Table 37-2 summarizes the port security authorization results for this active database. The conditions listed refer to the conditions from Table 37-1.
Copyright 2010-2013, Cisco Systems, Inc. All rights reserved.