Configuring Port Security
•
•
•
•
•
•
•
Configuring Port Security
These sections describe how to configure port security:
•
•
•
•
•
•
•
Cisco 7600 Series Router Cisco IOS Software Configuration Guide, Release 12.2SX
47-4
switchport
switchport trunk encapsulation
switchport mode trunk
switchport nonegotiate
If you reconfigure a secure access port as a trunk, port security converts all the sticky and static
–
secure addresses on that port that were dynamically learned in the access VLAN to sticky or
static secure addresses on the native VLAN of the trunk. Port security removes all secure
addresses on the voice VLAN of the access port.
If you reconfigure a secure trunk as an access port, port security converts all sticky and static
–
addresses learned on the native VLAN to addresses learned on the access VLAN of the access
port. Port security removes all addresses learned on VLANs other than the native VLAN.
Note
Port security uses the VLAN ID configured with the switchport trunk native vlan
command for both IEEE 802.1Q trunks and ISL trunks.
With releases earlier than Release 12.2(18)SXE, port security does not support trunks.
With Release 12.2(18)SXE and later releases, port security supports IEEE 802.1Q tunnel ports.
With releases earlier than Release 12.2(18)SXE, port security does not support IEEE 802.1Q tunnel
ports.
Port security does not support Switch Port Analyzer (SPAN) destination ports.
Port security does not support EtherChannel port-channel interfaces.
With releases earlier than Release 12.2(33)SXH, port security and 802.1X port-based authentication
cannot both be configured on the same port:
If you try to enable 802.1X port-based authentication on a secure port, an error message appears
–
and 802.1X port-based authentication is not enabled on the port.
If you try to enable port security on a port configured for 802.1X port-based authentication, an
–
error message appears and port security is not enabled on the port.
Take care when you enable port security on the ports connected to the adjacent switches when there
are redundant links running between the switches because port security might error-disable the ports
due to port security violations.
Enabling Port Security, page 47-5
Configuring the Port Security Violation Mode on a Port, page 47-6
Configuring the Port Security Rate Limiter, page 47-7
Configuring the Maximum Number of Secure MAC Addresses on a Port, page 47-9
Enabling Port Security with Sticky MAC Addresses on a Port, page 47-10
Configuring a Static Secure MAC Address on a Port, page 47-11
Configuring Secure MAC Address Aging on a Port, page 47-12
Chapter 47
Configuring Port Security
OL-4266-08