I have searched the web and seen other posts regarding this issue but haven't found a solution or explanation to this problem....
Here is my situation:
I have multiple switches and multiple VLAN's throughout my facility that I need to implement Port Security on.
My desktop support team have Fluke network testers they use on a regular basis and are heavily reliant upon.
I am attempting to configure each port with STICKY port security so that it grabs the MAC address of the currently connected device and I am trying to add the addresses of the Fluke devices so the desktop support team can still use the Flukes.
Th first port in a specific VLAN works fine when I drop the config onto it. The second port in that same VLAN however gives me the following error:
When you apply the port security command to a port and it learnes mac address via sticky or statically, it adds it in mac address table using static entry. so if you apply the same mac address on other interfaces, it will throw an error reporting duplicate mac address,
So you can not have same mac address configured statically or via sticky on two different ports.
I am having the same issue. Do you any resolution to this problem. How would I stick same MAC address on two ports that are in the same VLAN. I am using 3750 and tried MAC-ACLs as well but it didn't work. Can VLAN map help me in this regard? or any other solution.
This is actually a pretty cool feature, i didn't even know it existed until I was looking for a solution to advertise a subnet (prefix in BGP talk), only if a certain condition existed. This is exactly what conditional advertisements does
j ai une question j ai achete un routeur cisco 887VA-k9 , je le configuré avec la configuration ci- dessous
si je le lier avec mon pc portable sur l un de ses ports directement ça marche toute est bien ( la connexion internet + m...
Attached policy provides CLI access to the Cisco 4G router over text messaging. Two files are in the attached .tar file:
2. PDF with instructions on how to load and use the .tcl file.