We are currently using 3560 switches in our branches. We are in the process of implementing port-security on all these switches. In our testing we have been using sticky. The issue has come up with our remote users that travel from branch to branch with their laptops. They usually unplug the PC in an office from the IP phone and hook up there laptop. How can we allow that to happen without causing a violation on the interface? I am looking into MAC ACL but not sure it will work with sticky. I am fine changing to dynamic if it will work that way.
802.1x is probably the best solution if possible to implement. Port-Security can also work if you lower the security slightly. You could allow one more MAC-address on the Data-vlan and additionally configure a timeout on the learned entries instead of using sticky.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...