Cisco WS-C3020 Software Configuration Manual page 502

Catalyst blade switch for hp
Table of Contents

Advertisement

Configuring Port Security
A secure port cannot belong to a Gigabit EtherChannel port group.
Note
When you enable port security on an interface that is also configured with a voice VLAN, set the
maximum allowed secure addresses on the port to two. When the port is connected to a Cisco IP
phone, the IP phone requires one MAC address. The Cisco IP phone address is learned on the voice
VLAN, but is not learned on the access VLAN. If you connect a single PC to the Cisco IP phone,
no additional MAC addresses are required. If you connect more than one PC to the Cisco IP phone,
you must configure enough secure addresses to allow one for each PC and one for the phone.
When you enter a maximum secure address value for an interface, and the new value is greater than
the previous value, the new value overwrites the previously configured value. If the new value is
less than the previous value and the number of configured secure addresses on the interface exceeds
the new value, the command is rejected.
The switch does not support port security aging of sticky secure MAC addresses.
Table 23-3
Table 23-3
Type of Port or Feature on Port
1
DTP
Trunk port
Dynamic-access port
Routed port
SPAN source port
SPAN destination port
EtherChannel
Tunneling port
Protected port
IEEE 802.1x port
Voice VLAN port
Private VLAN port
IP source guard
Dynamic Address Resolution Protocol (ARP) inspection
Flex Links
1. DTP = Dynamic Trunking Protocol
2. A port configured with the switchport mode dynamic interface configuration command.
3. A VLAN Query Protocol (VQP) port configured with the switchport access vlan dynamic interface configuration command.
4. You must set the maximum allowed secure addresses on the port to two plus the maximum number of secure addresses
allowed on the access VLAN.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
23-12
Voice VLAN is only supported on access ports and not on trunk ports, even though the
configuration is allowed.
summarizes port security compatibility with other port-based features.
Port Security Compatibility with Other Switch Features
2
port
3
4
Chapter 23
Configuring Port-Based Traffic Control
Compatible with Port Security
No
Yes
No
No
Yes
No
No
Yes
Yes
Yes
Yes
No
Yes
Yes
Yes
OL-8915-03

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3020

Table of Contents