Cisco Catalyst 3560-X Software Configuration Manual page 758

Hide thumbs Also See for Catalyst 3560-X:
Table of Contents

Advertisement

Configuring Port Security
VLAN, but is not learned on the access VLAN. If you connect a single PC to the Cisco IP phone,
no additional MAC addresses are required. If you connect more than one PC to the Cisco IP phone,
you must configure enough secure addresses to allow one for each PC and one for the phone.
When a trunk port configured with port security and assigned to an access VLAN for data traffic and
to a voice VLAN for voice traffic, entering the switchport voice and switchport priority extend
interface configuration commands has no effect.
When a connected device uses the same MAC address to request an IP address for the access VLAN
and then an IP address for the voice VLAN, only the access VLAN is assigned an IP address.
When you enter a maximum secure address value for an interface, and the new value is greater than
the previous value, the new value overwrites the previously configured value. If the new value is less
than the previous value and the number of configured secure addresses on the interface exceeds the
new value, the command is rejected.
The switch does not support port security aging of sticky secure MAC addresses.
Table 1-3
Table 1-3
Type of Port or Feature on Port
1
DTP
Trunk port
Dynamic-access port
Routed port
SPAN source port
SPAN destination port
EtherChannel
Tunneling port
Protected port
IEEE 802.1x port
Voice VLAN port
Private VLAN port
IP source guard
Dynamic Address Resolution Protocol (ARP) inspection
Flex Links
1. DTP = Dynamic Trunking Protocol
2. A port configured with the switchport mode dynamic interface configuration command.
3. A VLAN Query Protocol (VQP) port configured with the switchport access vlan dynamic interface configuration command.
4. You must set the maximum allowed secure addresses on the port to two plus the maximum number of secure addresses
allowed on the access VLAN.
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
1-12
summarizes port security compatibility with other port-based features.
Port Security Compatibility with Other Switch Features
2
port
3
4
Chapter 1
Configuring Port-Based Traffic Control
Compatible with Port Security
No
Yes
No
No
Yes
No
Yes
Yes
Yes
Yes
Yes
No
Yes
Yes
Yes
OL-25303-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3750-x

Table of Contents