Cisco Systems 3560X Manual De Usuario

Descargar
Página de 1438
 
28-9
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
Chapter 28      Configuring Port-Based Traffic Control
Configuring Port Security
If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, 
when the MAC address of a station attempting to access the port is different from any of the identified 
secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address 
configured or learned on one secure port attempts to access another secure port, a violation is flagged. 
  •
  •
  •
  •
  •
  •
  •
Understanding Port Security
  •
  •
Secure MAC Addresses
You configure the maximum number of secure addresses allowed on a port by using the switchport 
port-security maximum 
value
 interface configuration command.
Note
If you try to set the maximum value to a number less than the number of secure addresses already 
configured on an interface, the command is rejected.
The switch supports these types of secure MAC addresses:
  •
Static secure MAC addresses—These are manually configured by using the switchport 
port-security mac-address 
mac-address
 interface configuration command, stored in the address 
table, and added to the switch running configuration.
  •
Dynamic secure MAC addresses—These are dynamically configured, stored only in the address 
table, and removed when the switch restarts. 
  •
Sticky 
secure MAC addresses—These can be dynamically learned or manually configured, stored in 
the address table, and added to the running configuration. If these addresses are saved in the 
configuration file, when the switch restarts, the interface does not need to dynamically reconfigure 
them. 
You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses 
and to add them to the running configuration by enabling sticky learning. To enable sticky learning, enter 
the switchport port-security mac-address sticky interface configuration command. When you enter 
this command, the interface converts all the dynamic secure MAC addresses, including those that were 
dynamically learned before sticky learning was enabled, to sticky secure MAC addresses. All sticky 
secure MAC addresses are added to the running configuration. 
The sticky secure MAC addresses do not automatically become part of the configuration file, which is 
the startup configuration used each time the switch restarts. If you save the sticky secure MAC addresses 
in the configuration file, when the switch restarts, the interface does not need to relearn these addresses. 
If you do not save the sticky secure addresses, they are lost.