
To enable sticky learning, enter the switchport port-security mac-address sticky command.
CISCO SWITCH PORT SECURITY MAC
You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling sticky learning. Although sticky secure addresses can be manually configured, it is not recommended. If these addresses are saved in the configuration file, the interface does not need to dynamically relearn them when the switch restarts. These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration.

CISCO SWITCH PORT SECURITY FULL
If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the workstations that are allowed to access the port.
CISCO SWITCH PORT SECURITY HOW TO
This chapter describes how to configure port security on Catalyst 4500 series switches. Configuring NetFlow Statistics Collection.Port Unicast and Multicast Flood Blocking.

Understanding and Configuring Dynamic ARP Inspection.Configuring DHCP Snooping and IP Source Guard.Understanding and Configuring 802.1X Port-Based Authentication.Understanding and Configuring IP Multicast.Configuring 802.1Q and Layer 2 Protocol Tunneling.Configuring IGMP Snooping and Filtering.Understanding and Configuring EtherChannel.Understanding and Configuring Multiple Spanning Trees.Configuring Layer 2 Ethernet Interfaces.Environmental Monitoring and Power Management.Configuring Supervisor Engine Redundancy using RPR and SSO.Configuring the Switch for the First Time.
