Port Security v2.0
Port Security v2.0
www.cisco.com/port security
dynamically learned before sticky learning was enabled, to sticky secure MAC addresses. All
sticky secure MAC addresses are added to the running configuration.
The sticky secure MAC addresses do not automatically become part of the configuration file,
which is the startup configuration used each time the switch restarts. If you save the sticky
secure MAC addresses in the configuration file, when the switch restarts, the interface does not
need to relearn these addresses. If you do not save the sticky secure addresses, they are lost.
If sticky learning is disabled, the sticky secure MAC addresses are converted to dynamic secure
addresses and are removed from the running configuration.
Security Violations
It is a security violation when one of these situations occurs:
The maximum number of secure MAC addresses have been added to the address table,
and a station whose MAC address is not in the address table attempts to access the
interface.
An address learned or configured on one secure interface is seen on another secure
interface in the same VLAN.
Running diagnostic tests with port security enabled.
You can configure the interface for one of three violation modes, based on the action to be
taken if a violation occurs:
protect—when the number of secure MAC addresses reaches the maximum limit
allowed on the port, packets with unknown source addresses are dropped until you
remove a sufficient number of secure MAC addresses to drop below the maximum value
or increase the number of maximum allowable addresses. You are not notified that a
security violation has occurred.
Note We do not recommend configuring the protect violation mode on a trunk port.
The protect mode disables learning when any VLAN reaches its maximum limit,
even if the port has not reached its maximum limit.
restrict—when the number of secure MAC addresses reaches the maximum limit
allowed on the port, packets with unknown source addresses are dropped until you
remove a sufficient number of secure MAC addresses to drop below the maximum value
or increase the number of maximum allowable addresses. In this mode, you are notified
that a security violation has occurred. An SNMP trap is sent, a syslog message is
logged, and the violation counter increments.
shutdown—a port security violation causes the interface to become error-disabled and
to shut down immediately, and the port LED turns off. When a secure port is in the error-
disabled state, you can bring it out of this state by entering the errdisable recovery
cause psecure-violation global configuration command, or you can manually re-enable it
by entering the shutdown and no shut down interface configuration commands. This is
the default mode.
www.cisco.com/port security
shutdown vlan—Use to set the security violation mode per-VLAN. In this mode, the
VLAN is error disabled instead of the entire port when a violation occurs
This table shows the violation mode and the actions taken when you configure an interface
for port security.
protect No No No No No No
vlan
1 Packets with unknown source addresses are dropped until you remove a sufficient number of
secure MAC addresses.
2 The switch returns an error message if you manually configure an address that would cause a
security violation.
3 Shuts down only the VLAN on which the violation occurred.
That means after 2 hours, learned MAC addresses are removed. For example, if you have 2
learned MAC addresses on that port and the switch sees a third, the port will err-disable. If there
is no activity from one of those 2 MAC addresses for the specified aging time, the MAC address
is removed.
You can use port security aging to set the aging time for all secure addresses on a port. Two
types of aging are supported per port:
Absolute—The secure addresses on the port are deleted after the specified aging time.
Inactivity—The secure addresses on the port are deleted only if the secure addresses
are inactive for the specified aging time.
www.cisco.com/port security
When a switch joins a stack, the new switch will get the configured secure addresses. All
dynamic secure addresses are downloaded by the new stack member from the other stack
members.
When a switch (either the active switch or a stack member) leaves the stack, the remaining
stack members are notified, and the secure MAC addresses configured or learned by that
switch are deleted from the secure MAC address table.
Port security can only be configured on static access ports or trunk ports. A secure port
cannot be a dynamic access port.
A secure port cannot be a destination port for Switched Port Analyzer (SPAN).
Voice VLAN is only supported on access ports and not on trunk ports, even though the
configuration is allowed.
When you enable port security on an interface that is also configured with a voice VLAN,
set the maximum allowed secure addresses on the port to two. When the port is
connected to a Cisco IP phone, the IP phone requires one MAC address. The Cisco IP
phone address is learned on the voice VLAN, but is not learned on the access VLAN. If
you connect a single PC to the Cisco IP phone, no additional MAC addresses are
required. If you connect more than one PC to the Cisco IP phone, you must configure
enough secure addresses to allow one for each PC and one for the phone.
When a trunk port configured with port security and assigned to an access VLAN for
data traffic and to a voice VLAN for voice traffic, entering the switchport
voice and switchport priority extend interface configuration commands has no effect.
When a connected device uses the same MAC address to request an IP address for the access
VLAN and then an IP address for the voice VLAN, only the access VLAN is assigned an IP
address.
When you enter a maximum secure address value for an interface, and the new value is
greater than the previous value, the new value overwrites the previously configured
value. If the new value is less than the previous value and the number of configured
secure addresses on the interface exceeds the new value, the command is rejected.
The switch does not support port security aging of sticky secure MAC addresses.
This table summarizes port security compatibility with other port-based features.
www.cisco.com/port security
Table 3. Port Security Compatibility with Other Switch Features
Procedure
Command or Action Purpose
Step enable Enables privileged EXEC mode.
1 Example: Enter your password if prompted.
Device> enable
Device(config)# interface
gigabitethernet1/0/1
Step switchport mode {access | trunk} Sets the interface switchport mode as access
4 Example: or trunk; an interface in the default mode
(dynamic auto) cannot be configured as a
Device(config-if)# switchport mode secure port.
www.cisco.com/port security
Command or Action Purpose
access
www.cisco.com/port security
Command or Action Purpose
n | shutdown vlan} detected, as one of these:
Example: protect —When the number of port
secure MAC addresses reaches the
Device(config-if)# switchport port- maximum limit allowed on the port,
security violation restrict packets with unknown source
addresses are dropped until you
remove a sufficient number of secure
MAC addresses to drop below the
maximum value or increase the
number of maximum allowable
addresses. You are not notified that a
security violation has occurred.
Note We do not recommend
configuring the protect mode
on a trunk port. The protect
mode disables learning when
any VLAN reaches its
maximum limit, even if the
port has not reached its
maximum limit.
restrict —When the number of secure
MAC addresses reaches the limit
allowed on the port, packets with
unknown source addresses are
dropped until you remove a sufficient
number of secure MAC addresses or
increase the number of maximum
allowable addresses. An SNMP trap is
sent, a syslog message is logged, and
the violation counter increments.
shutdown —The interface is error-
disabled when a violation occurs, and
the port LED turns off. An SNMP trap
is sent, a syslog message is logged,
and the violation counter increments.
shutdown vlan —Use to set the
security violation mode per VLAN. In
this mode, the VLAN is error disabled
instead of the entire port when a
violation occurs.
No When a secure port is in the
te error-disabled state, you can
bring it out of this state by
entering the errdisable
recovery cause psecure-
violation global configuration
command. You can manually
re-enable it by entering
the shutdown and no shutdo
wn interface configuration
www.cisco.com/port security
Command or Action Purpose
commands or by using
the clear errdisable interface
vlan privileged EXEC
command.
Step switchport port-security [mac- (Optional) Enters a secure MAC address for
9 address mac-address [vlan {vlan-id | the interface. You can use this command to
{access | voice}}] enter the maximum number of secure MAC
Example: addresses. If you configure fewer secure
MAC addresses than the maximum, the
Device(config-if)# switchport port- remaining MAC addresses are dynamically
security mac-address learned.
00:A0:C7:12:C9:25 vlan 3 voice Not If you enable sticky learning after you
e enter this command, the secure
addresses that were dynamically
learned are converted to sticky
secure MAC addresses and are
added to the running configuration.
(Optional) vlan —sets a per-VLAN maximum
value.
Enter one of these options after you enter
the vlan keyword:
vlan-id —On a trunk port, you can
specify the VLAN ID and the MAC
address. If you do not specify a VLAN
ID, the native VLAN is used.
access —On an access port,
specifies the VLAN as an access
VLAN.
voice —On an access port, specifies
the VLAN as a voice VLAN.
Not The voice keyword is available only if
e a voice VLAN is configured on a port
and if that port is not the access
VLAN. If an interface is configured for
voice VLAN, configure a maximum of
two secure MAC addresses.
Step switchport port-security mac- (Optional) Enables sticky learning on the
10 address sticky interface.
Example:
www.cisco.com/port security
Command or Action Purpose
security mac-address sticky running configuration.
00:A0:C7:12:C9:25 vlan voice Not If you do not enable sticky learning
e before this command is entered, an
error message appears, and you
cannot enter a sticky secure MAC
address.
(Optional) vlan —sets a per-VLAN maximum
value.
Enter one of these options after you enter
the vlan keyword:
vlan-id —On a trunk port, you can
specify the VLAN ID and the MAC
address. If you do not specify a VLAN
ID, the native VLAN is used.
access —On an access port,
specifies the VLAN as an access
VLAN.
voice —On an access port, specifies
the VLAN as a voice VLAN.
Not The voice keyword is available only if
e a voice VLAN is configured on a port
and if that port is not the access
VLAN.
Step end Returns to privileged EXEC mode.
12 Example:
Device(config)# end
Use this feature to remove and add devices on a secure port without manually deleting the
existing secure MAC addresses and to still limit the number of secure addresses on a port. You
can enable or disable the aging of secure addresses on a per-port basis.
www.cisco.com/port security
Procedure
www.cisco.com/port security
Command or Action Purpose
secure addresses on
this port age out only
if there is no data
traffic from the
secure source
addresses for the
specified time period.
Step 5 end Returns to privileged EXEC
Example: mode.
Device(config)# end
This example shows how to enable port security on a port and to set the maximum
number of secure addresses to 50. The violation mode is the default, no static secure
MAC addresses are configured, and sticky learning is enabled.
This example shows how to configure a static secure MAC address on VLAN 3 on a
port:
www.cisco.com/port security
This example shows how to enable sticky port security on a port, to manually configure
MAC addresses for data VLAN and voice VLAN, and to set the total maximum number
of secure addresses to 20 (10 for data VLAN and 10 for voice VLAN).
www.cisco.com/port security