we are having port security in our huge network . when a PC is moved from one location to another port violation is found in switch logs and the pc is denied access to the network . in this cases we would clear the port violation configuration and then re configure the port violation to make the port adapt to the new mac . but we experience a strange port violation even when we reconfigure the port security violation . reson being said by my seniors is that the mac is also learning in another switch . how to clear this issue and make the pc connect to the network without removing the port security in the switch interface .
configure the port violation to make the port adapt to the new mac
hen a PC is moved from one location to another port violation is found in switch logs and the pc is denied access to the network
So why bother putting a sticky MAC address if users are allowed to move their PCs from one switch(port) to another? Observe the two-skunk-rule.
A man walks into a general store in Vermont and mentions to the owner that he has a problem. A skunk has found its way into his house. He needs to get rid of it but is afraid of being sprayed.
"No problem!" exclaims the proprietor. "Skunks love carrots. Just buy a bunch of carrots. Cut them into pieces and make a trail out of the house into the woods. Use a plank to make a ramp down the front steps."
A week later the man returns to the store. "You sure were right about skunks liking carrots", he said to the owner. "So, you got rid of him?", the owner replied.
hi the solution leolaohoo provided doesnt solve our problem since we require port security in our switches . we just want to clear the cache of the mac table in the previous switch in which the pc was there . we removed the pc still the mac table is having it . it would be better if there is a command to refresh the mac table of the switch.
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...