


If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the workstations that are allowed to access the port.

Refer to the Catalyst 4500 Series Switch Cisco IOS Command Reference and related publications at this location: If the command is not found in the Cisco Catalyst 4500 Command Reference, you can locate it in the larger Cisco IOS library. Note For complete syntax and usage information for the switch commands used in this chapter, see the Cisco Catalyst 4500 Series Switch Command Reference and related publications at this location: Port Security Guidelines and Restrictions.It provides guidelines, procedures, and configuration examples. This chapter describes how to configure port security on Catalyst 4500 series switches. Configuring NetFlow Statistics Collection.Environmental Monitoring and Power Management.Port Unicast and Multicast Flood Blocking.Understanding and Configuring Dynamic ARP Inspection.Configuring DHCP Snooping and IP Source Guard.Configuring 802.1x Port-Based Authentication.Understanding and Configuring IP Multicast.Configuring 802.1Q and Layer 2 Protocol Tunneling.Configuring IGMP Snooping and Filtering.Understanding and Configuring EtherChannel.Understanding and Configuring Multiple Spanning Trees.Configuring Layer 2 Ethernet Interfaces.Configuring Supervisor Engine Redundancy on the Catalyst 4507R and Catalyst 4510R Switches.Configuring the Switch for the First Time.
