Contents
47
Software Configuration GuideāRelease IOS XE 3.9.xE and IOS 15.2(5)Ex
Configuring Port Security 55-1
Port Security Commands 55-1
About Port Security 55-3
Secure MAC Addresses 55-3
Maximum Number of Secure MAC Addresses 55-4
Aging Secure MAC Addresses 55-5
Sticky Addresses on a Port 55-5
Forbidden MAC Addresses 55-6
Violation Actions 55-6
Invalid Packet Handling 55-6
Configuring Port Security on Access Ports 55-7
Configuring Port Security on Access Ports 55-7
Examples of Port Security on Access Ports 55-10
Example 1: Setting Maximum Number of Secure Addresses 55-11
Example 2: Setting a Violation Mode 55-11
Example 3: Setting the Aging Timer 55-11
Example 4: Setting the Aging Timer Type 55-12
Example 5: Configuring a Secure MAC Address 55-12
Example 6: Configuring Sticky Port Security 55-13
Example 7: Setting a Rate Limit for Bad Packets 55-13
Example 8: Clearing Dynamic Secure MAC Addresses 55-14
Configuring Port Security on PVLAN Ports 55-14
Configuring Port Security on an Isolated Private VLAN Host Port 55-14
Example of Port Security on an Isolated Private VLAN Host Port 55-16
Configuring Port Security on a Private VLAN Promiscuous Port 55-16
Example of Port Security on a Private VLAN Promiscuous Port 55-17
Configuring Port Security on Trunk Ports 55-17
Configuring Trunk Port Security 55-17
Examples of Trunk Port Security 55-19
Example 1: Configuring a Maximum Limit of Secure MAC Addresses for All VLANs 55-19
Example 2: Configuring a Maximum Limit of Secure MAC Addresses for Specific VLANs 55-20
Example 3: Configuring Secure MAC Addresses in a VLAN Range 55-20
Trunk Port Security Configuration Guidelines and Restrictions 55-21
Port Mode Changes 55-22
Configuring Port Security on Voice Ports 55-22
Configuring Port Security on Voice Ports 55-23
Examples of Voice Port Security 55-25
Example 1: Configuring Maximum MAC Addresses for Voice and Data VLANs 55-25
Example 2: Configuring Sticky MAC Addresses for Voice and Data VLANs 55-26