Specifications
9-5
System Management Software Configuration Guide for Cisco IE 2000U and Connected Grid Switches
Chapter 9 Configuring Port-Based Traffic Control
Prerequisites
You can configure the interface for one of three violation modes, based on the action to be taken if a
violation occurs:
• protect—when the number of secure MAC addresses reaches the maximum limit allowed on the
port, packets with unknown source addresses are dropped until you remove a sufficient number of
secure MAC addresses to drop below the maximum value or increase the number of maximum
allowable addresses. You are not notified that a security violation has occurred.
Note We do not recommend configuring the protect violation mode on a trunk port. The protect
mode disables learning when any VLAN reaches its maximum limit, even if the port has not
reached its maximum limit.
• restrict—when the number of secure MAC addresses reaches the maximum limit allowed on the
port, packets with unknown source addresses are dropped until you remove a sufficient number of
secure MAC addresses to drop below the maximum value or increase the number of maximum
allowable addresses. In this mode, you are notified that a security violation has occurred. An SNMP
trap is sent, a syslog message is logged, and the violation counter increments.
• shutdown (Default)—a port security violation causes the interface to become error-disabled and to
shut down immediately, and the port LED turns off. When a secure port is in the error-disabled state,
you can bring it out of this state by entering the errdisable recovery cause psecure-violation global
configuration command, or you can manually re-enable it by entering the shutdown and no shut
down interface configuration commands.
Table 9-1 shows the violation mode and the actions taken when you configure an interface for port
security.
Prerequisites
Review the “Information About Port-Based Traffic Control” section on page 9-1.
Guidelines and Limitations
Storm Control
• The switch does not require additional configuration to cause the switch storm-control counters to
increment for small frames because the storm-control feature correctly handles small frames.
However, because of hardware limitations and the way in which packets of different sizes are
Table 9-1 Security Violation Mode Actions
Violation Mode
Traffic is
forwarded
1
1. Packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses.
Sends SNMP
trap
Sends syslog
message
Displays error
message
2
2. The switch returns an error message if you manually configure an address that would cause a security violation.
Violation
counter
increments Shuts down port
protect No No No No No No
restrict No Yes Yes No Yes No
shutdown No No No No Yes Yes