25-9
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
Chapter25 Configuring Port-Based Tra ffic Control Configuring Port Security
If sticky learning is disabled, the sticky secure M AC address es ar e co nverted to dyn am ic sec ur e
addresses and are removed from the running configuration.
The maximum number of secure MAC addresses that you can configure on a switch or switch stack is
set by the maximum number of available MAC addresses allowed in the system. This number is
determined by the active Switch Database Management (SDM) template. See Chapter 8, “Configuri ng
SDM Templates.” This number is the total of available MAC addresses, including those used for other
Layer 2 functions and any other secure MAC addresses configured on interfaces.
Security Violations
It is a security violation when one of these situations occurs:
The maximum number of secure MAC addresses have been added to the address table, and a station
whose MAC address is not in the address table attempts to access the interface.
An address learned or configured on one secure interface is seen on anothe r se cu re in ter face in t he
same VLAN.
You can configure the interface for one of three violation modes, based on the action to be taken if a
violation occurs:
protect—when the number of secure MAC addresses reaches the maximum limit allowed on the
port, packets with unknown source addresses are dropped until you remove a sufficient number of
secure MAC addresses to drop below the maximum value or increase the number of maximum
allowable addresses. You are not notified that a security violation has occurred.
Note We do not recommend configuring the protect violation mode on a trunk port. The protect
mode disables learning when any VLAN reaches its maximum limit, even if the port has not
reached its maximum limit.
restrict—when the number of secure MAC addresses reaches the maximum limit allowed on the
port, packets with unknown source addresses are dropped until you remove a sufficient number of
secure MAC addresses to drop below the maximum value or increase the number of maximum
allowable addresses. In this mode, you are notified that a security viol ation has occurred. An SNMP
trap is sent, a syslog message is logged, and the violation counter increments.
shutdown—a port security violation causes the interface to become error-disabled an d to shut down
immediately, and the port LED turns off. An SNMP trap is sent, a syslog message is logged, and the
violation counter increments. When a secure port is in the e rror-disabled state, you can bring it out
of this state by entering the errdisable recovery cause psecure-violation global configuration
command, or you can manually re-enable it by e n t ering the shutdown and no shut down interface
configuration commands. This is the default mode.
shutdown vlan—Use to set the security violation mode per-VLAN. In this mode, the VLA N is error
disabled instead of the entire port when a violation occurs
Table25-1 shows the vi ola tio n mode an d the act ions taken whe n you configu re a n in terfa ce for po rt
security.