Hi there, Thank you very much for uploading this video. It was to the point and informative. However, when I was practicing, I could not see any violations occurring. The security violation count is '0' while the security action is 'Restrict'. The link is not going down. I switched my PC with a laptop and vice-versa (in the Cisco packet tracer) yet no changes. Please advise. Thanks!
Can you recommend a good book to learn more about Cisco IOS? Not doing any exams or anything, just curiosity...I've got a few managed switches to play with.
The sticky command learns the mac addresses and stores them in the running config. Check out the below link. www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_37_se/command/reference/cr1/cli3.html#wp1948361
Question: When setting port-security violation to protect or restrict and the interface goes down due to a violation, does it go back up after a while? Or does it have to be manually brought up? Thanks!
Restrict & protect violations will recover automatically given they meet the requirements. Shutdown will result in the interface going into the err-disable state which will need to be rectified.
It returns the error when I enter the mac: Switch(config-if)#switchport port-security mac-address 4444.4444.4444 Total secure mac-addresses on interface FastEthernet0/1 has reached maximum limit.
Nice and straight forward, well done!
Thanks man. Bit of an older video
I love this straight forward and to the point.
Thanks
Excellent training video. Please do complete the full ICND1 100-105 Training Videos Series. Well done Sir!
Thanks! Yes the plan is to finish this course very soon!
Love all yours videos, please more!!!
Thanks man! Making more now.
This is very helpful.
Thanks for the video!
Thanks for the comment. Glad you liked it!
Clearly Explained Thank you
Thanks!
Love you stuff bro
This was awesome! Thanks
Thanks!
very good and precise, thank you very much!
No problem 👍
that was good but why you don't use errdisable recovery interval or casue
Thanks for the explanation.
You're welcome!
This is great, Thank you so much !!
Hi there, Thank you very much for uploading this video. It was to the point and informative. However, when I was practicing, I could not see any violations occurring. The security violation count is '0' while the security action is 'Restrict'. The link is not going down. I switched my PC with a laptop and vice-versa (in the Cisco packet tracer) yet no changes. Please advise. Thanks!
Did you set the allowed MAC address to something like he did in the video around 3mins in?
Every Time I Understand With Your Videos Very Simply & Easy , Thanks Man.😍
Thanks man appreciate it!
CertBros Can I Qustion ?
Sure what's up?
Did you have any network Certification ?
I will appreciate if you can finish the part of recovering port from secure down to secure up after violation occur.
Excellent 👍
thank you
No problem!
Can you recommend a good book to learn more about Cisco IOS? Not doing any exams or anything, just curiosity...I've got a few managed switches to play with.
Please show us network diagram
Perfect - thanks..!!
You're welcome
Obrigado pela ajuda ... Muito bom e facilita o entendimento demais .
hello how can i enable the port security on all the Fast Ethernet ports using the interface range command?
Is this the same for trunk ports?
thanks for video
You're welcome. Thanks for the comment!
thanku so much sir
No problem! Thanks for commenting
Nice Thank You
Thanks!
what is the funtion the command with stiky included???
The sticky command learns the mac addresses and stores them in the running config. Check out the below link.
www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_37_se/command/reference/cr1/cli3.html#wp1948361
Nice
Thanks Sandeep
harry kane teaching ort security
Question: When setting port-security violation to protect or restrict and the interface goes down due to a violation, does it go back up after a while? Or does it have to be manually brought up?
Thanks!
Restrict & protect violations will recover automatically given they meet the requirements. Shutdown will result in the interface going into the err-disable state which will need to be rectified.
It returns the error when I enter the mac:
Switch(config-if)#switchport port-security mac-address 4444.4444.4444
Total secure mac-addresses on interface FastEthernet0/1 has reached maximum limit.
Thank you