When a connected device uses the same MAC address to request an IP address for the access VLAN
and then an IP address for the voice VLAN, only the access VLAN is assigned an IP address.
•
When you enter a maximum secure address value for an interface, and the new value is greater than the
previous value, the new value overwrites the previously configured value. If the new value is less than
the previous value and the number of configured secure addresses on the interface exceeds the new
value, the command is rejected.
•
The switch does not support port security aging of sticky secure MAC addresses.
This table summarizes port security compatibility with other port-based features.
Table 36: Port Security Compatibility with Other Switch Features
Compatible with Port SecurityType of Port or Feature on Port
NoDTP
11
port
12
YesTrunk port
NoDynamic-access port
13
NoRouted port
YesSPAN source port
NoSPAN destination port
YesEtherChannel
YesTunneling port
YesProtected port
YesIEEE 802.1x port
YesVoice VLAN port
14
YesIP source guard
YesDynamic Address Resolution Protocol (ARP) inspection
YesFlex Links
11
DTP=Dynamic Trunking Protocol
12
A port configured with the switchport mode dynamic interface configuration command.
13
A VLAN Query Protocol (VQP) port configured with the switchport access vlan dynamic interface configuration command.
14
You must set the maximum allowed secure addresses on the port to two plus the maximum number of secure addresses allowed on the access VLAN.
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
410 OL-29048-01
Configuring Port-Based Traffic Control
Port Security Configuration Guidelines