A <switchport port-security mac-address sticky> issue.
I have some trouble releasing the mac-address learned sticky on an interface.
I am working on a 3560 series switch with 12.2-25 SEE1 IOS image.
Here is an example of my port configuration.
switchport access vlan 91
switchport mode access
switchport port-security mac-address sticky
no logging event link-status
Usually, we use sticky learning for printers and a maximum of one mac address. The problem occur when we change the network card or the device itself. The mac address change but, I am not able to reset the sticky learning for the new mac. Even clear port-security sticky Dosent work. So the port stay in Err-disable mode until we deactivate the port-security or, change the default of the port-security option from 1 to 2 mac.
I have change the IOS for 12.2-40 and it seem to solve the problem.
I dosent find any issue on the cisco website.
Is there someone who already experience this kind of bug and, is there a different way to disable sticky learning without upgrading the IOS on all my switches ..
Re: A <switchport port-security mac-address sticky> issue.
To delete sticky secure MAC addresses from the address table, disable sticky learning, which converts the sticky secure MAC addresses to dynamic secure addresses. Use the no switchport port-security mac-address sticky interface configuration command. Delete dynamic secure addresses on an interface by using the clear port-security dynamic interface interface-id privileged EXEC command. To delete a dynamic secure MAC address, use the clear port-security dynamic address mac-addr privileged EXEC command.
This is actually a pretty cool feature, i didn't even know it existed until I was looking for a solution to advertise a subnet (prefix in BGP talk), only if a certain condition existed. This is exactly what conditional advertisements does
j ai une question j ai achete un routeur cisco 887VA-k9 , je le configuré avec la configuration ci- dessous
si je le lier avec mon pc portable sur l un de ses ports directement ça marche toute est bien ( la connexion internet + m...
Attached policy provides CLI access to the Cisco 4G router over text messaging. Two files are in the attached .tar file:
2. PDF with instructions on how to load and use the .tcl file.