![]() ![]() You can statically configure all secure MAC addresses by using the switchport port-security mac-address mac_address interface configuration command.See the "Configuring the Port Security Violation Mode on a Port" section for more information about the violation modes.Īfter you have set the maximum number of secure MAC addresses on a port, port security includes the secure addresses in the address table in one of these ways: Note After a secure MAC address is configured or learned on one secure port, the sequence of events that occurs when port security detects that secure MAC address on a different port in the same VLAN is known as a MAC move violation. If traffic with a secure MAC address that is configured or learned on one secure port attempts to access another secure port in the same VLAN, applies the configured violation mode. ![]() When the maximum number of secure MAC addresses is reached on a secure port and the source MAC address of the ingress traffic is different from any of the identified secure MAC addresses, port security applies the configured violation mode.If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the device attached to that port has the full bandwidth of the port.Ī security violation occurs in either of these situations: When you assign secure MAC addresses to a secure port, the port does not forward ingress traffic that has source addresses outside the group of defined addresses. You can use port security with dynamically learned and static MAC addresses to restrict a port's ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port. Port Security with Dynamically Learned and Static MAC Addresses Port Security with Sticky MAC Addresses.Port Security with Dynamically Learned and Static MAC Addresses.Port Security Guidelines and Restrictions.Note For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Software Releases 12.2SX Command References at this URL:
0 Comments
Leave a Reply. |