Port-security black-holing PC's connected to an IP-Phone
We are running port-security on a 3750-48PS-S switch running C3750-ipbasek9-mz.122-25.SEE IOS and we are experiencing a strange problem. We have a data vlan and a voice vlan configured on each port, we then run port-security sticky on each port with a maximum of 2 mac-addresses. PC's are connected behind Cisco IP-Phones. This is our standard config and normally we have no problem. On this switch though as soon as we turn on port security all of the PC's are black-holed. You cant ping them, rdp to them, and from the user perspective they have no network access. The ip-phones work fine and we show the mac address from the phone and the pc as securesticky addresses. The switch never shows the ports down due to a port-security violation. As soon as I disable port-security the pc's are restored to traffic. I've included a sample of our port configs.
Re: Port-security black-holing PC's connected to an IP-Phone
Found the problem...somehow the mac-address of the default-gateway router was entered/learned by one of the fast-ethernet ports and was written into the config as a sticky mac-address. So during the arp process all the PC's were fooled into thinking the default gateway was on a local ethernet port. Cleared the mac-address and everything is good now. Please close this thread.
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...