EasyManuals Logo

Cisco Catalyst 3750-X User Manual

Cisco Catalyst 3750-X
1438 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #724 background imageLoading...
Page #724 background image
28-16
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
Chapter 28 Configuring Port-Based Traffic Control
Configuring Port Security
To return the interface to the default condition as not a secure port, use the no switchport port-security
interface configuration command. If you enter this command when sticky learning is enabled, the sticky
secure addresses remain part of the running configuration but are removed from the address table. All
addresses are now dynamically learned.
To return the interface to the default number of secure MAC addresses, use the no switchport
port-security maximum value interface configuration command. To return the violation mode to the
default condition (shutdown mode), use the no switchport port-security violation {protocol | restrict}
interface configuration command.
To disable sticky learning on an interface, use the no switchport port
-security mac-address sticky
interface configuration command. The interface converts the sticky secure MAC addresses to dynamic
secure addresses. However, if you have previously saved the configuration with the sticky MAC
addresses, you should save the configuration again after entering the no switchport port-security
mac-address sticky command, or the sticky addresses will be restored if the switch reboots.
Use the cle
ar port-security {all | configured | dynamic | sticky} privileged EXEC command to delete
from the MAC address table all secure addresses or all secure addresses of a specific type (configured,
dynamic, or sticky) on the switch or on an interface.
To delete a specific secure MAC addres
s from the address table, use the no switchport port-security
mac-address mac-address interface configuration command. To delete all dynamic secure addresses on
an interface from the address table, enter the no switchport port-security interface configuration
command followed by the switchport port-security command (to re-enable port security on the
interface). If you use the no switchport port-security mac-address sticky interface configuration
command to convert sticky secure MAC addresses to dynamic secure MAC addresses before entering
the no switchport port-security command, all secure addresses on the interface except those that were
manually configured are deleted.
You must specifically delete configured secure MA
C addresses from the address table by using the no
switchport port-security mac-address mac-address interface configuration command.
This example shows how to enable port security on a port and to set the maximum number of secure
add
resses to 50. The violation mode is the default, no static secure MAC addresses are configured, and
sticky learning is enabled.
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# switchport mod
e access
Switch(config-if)# switchport por
t-security
Switch(config-if)# switchport por
t-security maximum 50
Switch(config-if)# switchport por
t-security mac-address sticky
This example shows how to configure a static secure MAC address on VLAN 3 on a port:
Switch(config)# interface gigabitethernet1/0/2
Switch(config-if)# switchport mod
e trunk
Switch(config-if)# switchport por
t-security
Switch(config-if)# switchport por
t-security mac-address 0000.02000.0004 vlan 3
This example shows how to enable sticky port security on a port, to manually configure MAC addresses
for data VLAN and voice VLAN, and to set the total maximum number of secure addresses to 20 (10 for
data VLAN and 10 for voice VLAN).
Switch(config)# interface tengigabitethernet1/0/1
Switch(config-if)# switchport acc
ess vlan 21
Switch(config-if)# switchport mod
e access
Switch(config-if)# switchport voi
ce vlan 22
Switch(config-if)# switchport por
t-security
Switch(config-if)# switchport por
t-security maximum 20
Switch(config-if)# switchport por
t-security violation restrict
Switch(config-if)# switchport por
t-security mac-address sticky
Switch(config-if)# switchport por
t-security mac-address sticky 0000.0000.0002

Table of Contents

Other manuals for Cisco Catalyst 3750-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3750-X and is the answer not in the manual?

Cisco Catalyst 3750-X Specifications

General IconGeneral
Switching Capacity160 Gbps
Stacking Bandwidth64 Gbps
Max Stacking Units9
Layer SupportLayer 2 and Layer 3
Form FactorRack-mountable
DRAM256 MB
Flash Memory64 MB
ModelCisco Catalyst 3750-X Series
Ports24 or 48 10/100/1000 Ethernet ports
Uplink Interfaces4 SFP or 2 SFP+
FeaturesStackWise Plus, EnergyWise
ImageIP Base or IP Services
Operating Temperature0 to 40°C
Operating Humidity10 to 85% noncondensing

Related product manuals