
- #Switchport port security mac address sticky maximum full
- #Switchport port security mac address sticky maximum mac
#Switchport port security mac address sticky maximum mac
Port security with sticky MAC addresses provides many of the same benefits as port security with static MAC addresses, but sticky MAC addresses can be learned dynamically. If the port has a link-down condition, all dynamically learned addresses are removed.įollowing bootup, a reload, or a link-down condition, port security does not populate the address table with dynamically learned MAC addresses until the port receives ingress traffic.Ī security violation occurs if the maximum number of secure MAC addresses have been added to the address table and the port receives traffic from a MAC address that is not in the address table.
#Switchport port security mac address sticky maximum full
If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the device attached to that port has the full bandwidth of the port.Ī security violation occurs in either of these situations:


When you assign secure MAC addresses to a secure port, the port does not forward ingress traffic that has source addresses outside the group of defined addresses. You can use port security with dynamically learned and static MAC addresses to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port. Port Security with Dynamically Learned and Static MAC Addresses
