Default Port Security Configuration - Cisco Catalyst 3550 series Software Configuration Manual

Multilayer switch
Hide thumbs Also See for Catalyst 3550 series:
Table of Contents

Advertisement

Configuring Port Security

Default Port Security Configuration

Table 21-2
Table 21-2 Default Port Security Configuration
Feature
Port security
Maximum number of secure MAC addresses
Violation mode
Sticky address learning
Port security aging
Port Security Configuration Guidelines
Follow these guidelines when configuring port security:
Catalyst 3550 Multilayer Switch Software Configuration Guide
21-10
shows the default port security configuration for an interface.
Port security can only be configured on static access ports, trunk ports, or 802.1Q tunnel ports.
A secure port cannot be a dynamic access port.
A secure port cannot be a destination port for Switched Port Analyzer (SPAN).
A secure port cannot belong to a Fast EtherChannel or Gigabit EtherChannel port group.
You cannot configure static secure or sticky secure MAC addresses on a voice VLAN.
When you enable port security on an interface that is also configured with a voice VLAN, you must
set the maximum allowed secure addresses on the port to at least two.
If any type of port security is enabled on the access VLAN, dynamic port security is automatically
enabled on the voice VLAN.
When a voice VLAN is configured on a secure port that is also configured as a sticky secure port,
all addresses seen on the voice VLAN are learned as dynamic secure addresses, and all addresses
seen on the access VLAN (to which the port belongs) are learned as sticky secure addresses.
The switch does not support port security aging of sticky secure MAC addresses.
The protect and restrict options cannot be simultaneously enabled on an interface.
Chapter 21
Configuring Port-Based Traffic Control
Default Setting
Disabled.
One.
Shutdown.
Disabled.
Disabled. Aging time is 0. When enabled, the default
type is absolute.
78-11194-09

Advertisement

Table of Contents
loading

Table of Contents