<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: connecting nexus 5000 in Switching</title>
    <link>https://community.cisco.com/t5/switching/connecting-nexus-5000/m-p/3338502#M406500</link>
    <description>&lt;P&gt;Typically, any Fibre Channel device in a SAN can attach to any SAN switch port and access SAN services based on zone membership. Port security features prevent unauthorized access to a switch port in the Cisco Nexus 5000 Series switch, using the following methods:&lt;BR /&gt; Login requests from unauthorized Fibre Channel devices (N ports) and switches (xE ports) are rejected.&lt;BR /&gt; All intrusion attempts are reported to the SAN administrator through system messages.&lt;BR /&gt; Configuration distribution uses the CFS infrastructure, and is limited to those switches that are CFS capable. Distribution is disabled by default.&lt;BR /&gt; Configuring the port security policy requires the Storage Protocol Services license.&lt;/P&gt;</description>
    <pubDate>Tue, 27 Feb 2018 08:50:08 GMT</pubDate>
    <dc:creator>sbhadrav@cisco.com</dc:creator>
    <dc:date>2018-02-27T08:50:08Z</dc:date>
    <item>
      <title>connecting nexus 5000</title>
      <link>https://community.cisco.com/t5/switching/connecting-nexus-5000/m-p/1747653#M184672</link>
      <description>&lt;P&gt;how to secure ports on the nexus 5000&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2019 09:43:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/connecting-nexus-5000/m-p/1747653#M184672</guid>
      <dc:creator>al_ahmadi99</dc:creator>
      <dc:date>2019-03-07T09:43:31Z</dc:date>
    </item>
    <item>
      <title>connecting nexus 5000</title>
      <link>https://community.cisco.com/t5/switching/connecting-nexus-5000/m-p/1747654#M184673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check out this link:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/configuration/guide/cli_rel_4_0_1a/psec.html#wp1345921"&gt;http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/configuration/guide/cli_rel_4_0_1a/psec.html#wp1345921&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 08:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/connecting-nexus-5000/m-p/1747654#M184673</guid>
      <dc:creator>robwils</dc:creator>
      <dc:date>2011-08-18T08:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: connecting nexus 5000</title>
      <link>https://community.cisco.com/t5/switching/connecting-nexus-5000/m-p/3338502#M406500</link>
      <description>&lt;P&gt;Typically, any Fibre Channel device in a SAN can attach to any SAN switch port and access SAN services based on zone membership. Port security features prevent unauthorized access to a switch port in the Cisco Nexus 5000 Series switch, using the following methods:&lt;BR /&gt; Login requests from unauthorized Fibre Channel devices (N ports) and switches (xE ports) are rejected.&lt;BR /&gt; All intrusion attempts are reported to the SAN administrator through system messages.&lt;BR /&gt; Configuration distribution uses the CFS infrastructure, and is limited to those switches that are CFS capable. Distribution is disabled by default.&lt;BR /&gt; Configuring the port security policy requires the Storage Protocol Services license.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2018 08:50:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/connecting-nexus-5000/m-p/3338502#M406500</guid>
      <dc:creator>sbhadrav@cisco.com</dc:creator>
      <dc:date>2018-02-27T08:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: connecting nexus 5000</title>
      <link>https://community.cisco.com/t5/switching/connecting-nexus-5000/m-p/3340923#M406871</link>
      <description>&lt;P&gt;Port security allows you to configure Layer 2 physical interfaces, Layer 2 port-channel interfaces, and virtual port channels (vPCs) to allow inbound traffic from only a restricted set of MAC addresses. The MAC addresses in the restricted set are called secure MAC addresses. In addition, the device does not allow traffic from these MAC addresses on another interface within the same VLAN. The number of MAC addresses that the device can secure is configurable per interface.&lt;BR /&gt; Unless otherwise specified, the term interface refers to physical interfaces, port-channel interfaces, and vPCs; likewise, the term Layer 2 interface refers to both Layer 2 physical interfaces and Layer 2 port-channel interfac&lt;/P&gt;</description>
      <pubDate>Fri, 02 Mar 2018 06:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/connecting-nexus-5000/m-p/3340923#M406871</guid>
      <dc:creator>sbhadrav@cisco.com</dc:creator>
      <dc:date>2018-03-02T06:10:12Z</dc:date>
    </item>
  </channel>
</rss>

