Overview

Port Security allows an administrator to control which devices are allowed to connect to specific physical ports on a switch. It is a primary defense against unauthorized devices joining the network.

Features

  • Maximum MACs: Limits the number of MAC addresses allowed on a port.
  • Sticky MACs: Dynamically learns MAC addresses and saves them to the running configuration.
  • Violation Actions: Defines what happens when an unauthorized device connects:
  • Shutdown: Disables the port (default).
  • Restrict: Drops traffic and logs the violation.
  • Protect: Drops traffic silently.