![clear cisco mac address table clear cisco mac address table](https://s3.studylib.net/store/data/025298003_1-6857c7f2c19cb51b59884b594c504898.png)
In a Cisco switch, you are able to configuration three types of security violation modes.
![clear cisco mac address table clear cisco mac address table](https://ccna-200-301.online/wp-content/uploads/2020/04/Switch-MAC-address-table-300x250.png)
When you disable the sticky learning, the learned addresses remain part of the MAC address table but are removed from the configuration.Are learned dynamically then converted to sticky secure MAC addresses and stored in the running configuration.Sticky secure MAC addresses have these characteristics: Sticky secure MAC addresses – like Dynamic secure MAC addresses, MACs are learned dynamically but are saved in the running configuration.They are removed from the configuration when the switch restarts. Dynamic secure MAC addresses – are dynamically learned by the switch and stored in its MAC address table.These MAC addresses are stored in the address table and in the running configuration of the switch. Static secure MAC addresses – configured manually with switchport port-security mac-address mac-address.We will discuss theses security violation modes a little bit later. A switch can be configured to only protect or restrict that port.
![clear cisco mac address table clear cisco mac address table](https://ciscoexam.online/diagram/1320-q19-expl.png)
In most of today’s scenarios when the switch detects a security violation, the switch automatically shuts down that port. If the maximum number of secure MAC addresses has been reached, a security violation occurs when a devices with a different MAC addresses tries to attach to that port.
Clear cisco mac address table full#
If you limit the number of allowed MAC addresses allowed on a port to only one MAC address, only one device will be able to connect to that port and will get the full bandwidth of the port. Any packet coming from other device is discarded by the switch as soon as it arrives on the switch port. When a MAC address, or a group of MAC addresses are configured to enable switch port security, the switch will forward packets only to the devices using those MAC addresses. Switch port security limits the number of valid MAC addresses allowed on a port.