Shuts down
port
Violation
counter
increments
Displays
error
message
Sends syslog
message
Sends SNMP
trap
Traffic is
forwarded
Violation
Mode
Yes
Yes
No
No
No
No
shutdown
No
Yes
No
Yes
No
No
shutdown
vlan
8 Packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses.
9 The switch returns an error message if you manually configure an address that would cause a security violation.
10 Shuts down only the VLAN on which the violation occurred.
Port Security Aging
You can use port security aging to set the aging time for all secure addresses on a port. Two types of aging
are supported per port:
•
Absolute
—
The secure addresses on the port are deleted after the specified aging time.
•
Inactivity
—
The secure addresses on the port are deleted only if the secure addresses are inactive for the
specified aging time.
Related Topics
Enabling and Configuring Port Security Aging, on page 344
Port Security and Switch Stacks
When a switch joins a stack, the new switch will get the configured secure addresses. All dynamic secure
addresses are downloaded by the new stack member from the other stack members.
When a switch (either the active switch or a stack member) leaves the stack, the remaining stack members
are notified, and the secure MAC addresses configured or learned by that switch are deleted from the secure
MAC address table.
Default Port Security Configuration
Table 34: Default Port Security Configuration
Default Setting
Feature
Disabled on a port.
Port security
Disabled.
Sticky address learning
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
338
OL-29434-01
Configuring Port-Based Traffic Control
Port Security Aging