kmfkbeat.blogg.se

How to port security with dynamically learned mac addresses
How to port security with dynamically learned mac addresses






how to port security with dynamically learned mac addresses how to port security with dynamically learned mac addresses

Why would one want to use the second command, if the first one does the job of entering the address into the secure MAC table and the configuration?Ī theory for the second command: Is it possible that the switch only adds the address to the table and eventually raises the counted addresses (towards the maximum limit) if it is actually *seen* on the port? So as long as that listed sticky address is not seen on the port, other dynamic addresses may "use up" the max counter before the stated one becomes active (and get's blocked in the process)? Switchport port-security mac-address sticky 1234.5678.9012 Switchport port-security mac-address 1234.5678.9012 I don't get why we have two possibilities to add a MAC address to the configuration: I have another questions related to the subject, maybe one of you knows the answer: If you disable sticky learning and enter the switchport port-security mac-address sticky mac-address interface configuration command, an error message appears, and the sticky secure MAC address is not added to the running configuration. If sticky learning is disabled, the sticky secure MAC addresses are converted to dynamic secure addresses and are removed from the running configuration. If you do not save the sticky secure addresses, they are lost. If port security is disabled, the sticky secure MAC addresses remain in the running configuration.į you save the sticky secure MAC addresses in the configuration file, when the switch restarts or the interface shuts down, the interface does not need to relearn these addresses.

how to port security with dynamically learned mac addresses how to port security with dynamically learned mac addresses

When you configure sticky secure MAC addresses by using the switchport port-security mac-address sticky mac-address interface configuration command, these addresses are added to the address table and the running configuration. The addresses that were removed can be dynamically reconfigured and added to the address table as dynamic addresses. If you disable sticky learning by using the no switchport port-security mac-address sticky interface configuration command or the running configuration is removed, the sticky secure MAC addresses remain part of the running configuration but are removed from the address table. When you enable sticky learning on an interface by using the switchport port-security mac-address sticky interface configuration command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses and adds all sticky secure MAC addresses to the running configuration.








How to port security with dynamically learned mac addresses