From the configuration shown, what can be determined?
A.
The sticky addresses are only those manually configured MAC addresses enabled with
the sticky keyword.
B.
The remaining secure MAC addresses are learned dynamically, converted to sticky
secure MAC addresses, and added to the running configuration.
C.
A voice VLAN is configured in this example, so port security should be set for a maximum
of 2.
D.
A security violation restricts the number of addresses to a maximum of 10 addresses per
access VLAN and voice VLAN. The port is shut down if more than 10 devices per VLAN
attempt to access the port.
Explanation:
By enabling sticky port security, you can configure an interface to convert the dynamic MAC
addresses to sticky secure MAC addresses and to add them to the running configuration.
You might want to do this if you do not expect the user to move to another port, and you
want to avoid statically configuring a MAC address on every port. To enable sticky port
security, enter the switchport port-security mac-address sticky command. When you enter
this command, the interface converts all the dynamic secure MAC addresses, including
those that were dynamically learned before sticky learning was enabled, to sticky secure
MAC addresses. The sticky secure MAC addresses do not automatically become part of the
configuration file, which is the startup configuration used each time the switch restarts. If you
save the running config file to the configuration file, the interface does not need to relearn
these addresses when the switch restarts. If you do not save the configuration, they are lost.
Reference:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/53SG/configuration/port_s
ec.html#wp1047668