SecureStatic Address Aging: Disabled
Maximum MAC Addresses: 5
Total MAC Addresses: 0
Configured MAC Addresses: 0
Sticky MAC Addresses: 0
Last Source Address:Vlan : 0000.0000.0000:0
Security Violation Count: 0S4
This is good. The configuration to prevent MAC flooding attack works fine on the Cisco switch.
There are three security violation modes: restriction, shutdown, and armenia telegram data protection modes to prevent MAC flooding attacks.
Protect : This is the least secure of the security violation modes. When the number of secure MAC addresses reaches the limit allowed on a port, packets with unknown source addresses are dropped until enough secure MAC addresses are removed or the number of maximum allowed addresses is increased. There is no notification that a security violation has occurred.
Limit : When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until enough secure MAC addresses are removed or the number of maximum allowed addresses is increased. In this mode, a notification appears that a security violation has occurred.
Shutdown : In this default security violation mode, a port security violation causes the interface to immediately go into error-disabled mode and the port indicator to turn off. It increments the violation counter. When a protected port is in the error-disabled state, it can be brought out of this state by entering the Shutdown and Do Not Shutdown interface configuration mode commands. More importantly, the port must be manually re-enabled by the administrator.