43-24
Software Configuration Guide—Release 15.0(2)SG
OL-23818-01
Chapter 43 Configuring Port Security
Configuring Port Security on Voice Ports
Step 6 Switch(config-if)# [no] switchport port-security
mac-address mac_address [vlan {voice | access}] (Optional) Specifies a secure MAC address for the
interface.
When you specify the vlan keyword, addresses are
configured in the specified VLAN.
voice—MAC address is configured in the voice
VLAN.
access—MAC address is configured in the access
VLAN.
You can use this command to configure secure MAC
addresses. If you configure fewer secure MAC addresses
than the maximum, the remaining MAC addresses are
dynamically learned.
To delete a MAC address from the address table, use the
no switchport port-security mac-address mac_address
command.
Note This command only applies to access, PVLAN
host, and PVLAN promiscuous mode. For more
details on PVLAN, trunk, or regular trunk mode,
refer to the “Configuring Port Security on Trunk
Ports” section on page 43-17.
Step 7 Switch(config-if)# [no] switchport port-security
mac-address sticky (Optional) Enables sticky learning on the interface.
To disable sticky learning on an interface, use the
no switchport port-security mac-address sticky
command. The interface converts the sticky secure MAC
addresses to dynamic secure addresses.
Step 8 Switch(config-if)# [no] switchport port-security
mac-address mac_address sticky [vlan {voice |
access}]
Specifies the sticky mac-address for the interface.
When you specify the vlan keyword, the mac-address
becomes sticky in the specified VLAN.
voice—MAC address becomes sticky in the voice
VLAN.
access—MAC address becomes sticky in the access
VLAN.
To delete a sticky secure MAC addresses from the address
table, use the no switchport port-security mac-address
mac_address sticky command. To convert sticky to
dynamic addresses, use the no switchport port-security
mac-address sticky command.
Note This command only applies to access, PVLAN
host, and PVLAN promiscuous mode. For more
details on PVLAN or trunk or regular trunk mode,
refer to the “Configuring Port Security on Trunk
Ports” section on page 43-17.
Command Purpose