When a switch (either the active switch or a stack member) leaves the stack, the remaining stack members
are notified, and the secure MAC addresses configured or learned by that switch are deleted from the secure
MAC address table.
Default Port Security Configuration
Table 35: Default Port Security Configuration
Default Setting
Feature
Disabled on a port.
Port security
Disabled.
Sticky address learning
1.
Maximum number of secure MAC
addresses per port
Shutdown. The port shuts down when the maximum number of secure
MAC addresses is exceeded.
Violation mode
Disabled. Aging time is 0.
Static aging is disabled.
Type is absolute.
Port security aging
Port Security Configuration Guidelines
•
Port security can only be configured on static access ports or trunk ports. A secure port cannot be a
dynamic access port.
•
A secure port cannot be a destination port for Switched Port Analyzer (SPAN).
•
Voice VLAN is only supported on access ports and not on trunk ports, even though the
configuration is allowed.
Note
•
When you enable port security on an interface that is also configured with a voice VLAN, set the
maximum allowed secure addresses on the port to two. When the port is connected to a Cisco IP phone,
the IP phone requires one MAC address. The Cisco IP phone address is learned on the voice VLAN,
but is not learned on the access VLAN. If you connect a single PC to the Cisco IP phone, no additional
MAC addresses are required. If you connect more than one PC to the Cisco IP phone, you must configure
enough secure addresses to allow one for each PC and one for the phone.
•
When a trunk port configured with port security and assigned to an access VLAN for data traffic and to
a voice VLAN for voice traffic, entering the
switchport voice
and
switchport priority extend
interface
configuration commands has no effect.
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01
409
Configuring Port-Based Traffic Control
Default Port Security Configuration