In this article, we will focus on detailed Port Security Configuration. For our Port Security Configuration, we will use the below topology. In this topology we will make examples for the configuration cases on Port Security.
You can DOWNLOAD the Packet Tracer example with .pkt format HERE.
Switch Port Security Topology
Here we will use four scenario on four switch port. According to these scenarios, the below Port Security configuration will be done:
1.port – max MAC 2 – 1 static MAC (PC1) – 1 dynamic MAC (PC2) – 1 violation (PC3) – violation type shutdown