Blocked unauthorized traffic

Unless you configure the switch to disable a port on which a security violation is detected, the switch security measures block unauthorized traffic without disabling the port. This implementation enables you to apply the security configuration to ports on which hubs, switches, or other devices are connected, and to maintain security while also maintaining network access to authorized users. For example:

How port security controls access
NOTE:

Broadcast and Multicast traffic is always allowed, and can be read by intruders connected to a port on which you have configured port security.