So, that is PAT.
You have one public address, which is the one all your private (internal) addresses are going to use to be routed into the Internet
If this is the scenario, you can use the configuration given in one of the first follow-ups to your post.
.va
Hi all,
How trustable are Zebra/Gated, to be used in a big DNS production environment ?
Which can be considered as a better choice if it is going to be used in a shared unicast implementation ?
Thanks in advance.
I see,
Yeah, you will have to run the same config for each interface.
---------------------
Hi again,
the detail is, that, when you run the same configuration in another interface, this overwrites the first one.
Can this I need, be done in my 24 port Catalyst 2900 with 12.0(5.2)XU...
What you are trying to do is possible.
First you tell the interface how many macs it can have, > then you configure the macs allowed.
---------------------------------------------
int fa0/1
port security max-mac-count 2
!
mac-address-table secure 0010.A47D.AD65 fa0/1
mac-address-table secure...
Hi,
I guess that solution doesn't fit my requirements, because in a Catalyst 2900 that sentence will only control the amount of mac addresses permited for that interface or the action to take in a specific case.
But not for a group of mac addresses that is going to be in some ports.
Thanks...
I have a group of mac addresses and I want only this group of mac addresses to have access to the switch ports I select.
I haven´t found a way to do it in a Cisco Catalyst 2900XL 24 port switch.
I'm using the 12.0(5.2)XU, MAINTENANCE IE, IOS version.
Thanks in advance.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.