Description | This article discusses MAC Learning Limit Violation Behavior on FortiSwitch. |
Scope | FortiSwitch (Managed). |
Solution |
This article explains the behavior of MAC limit violations when the same MAC address appears on different switch ports within the same and different VLANs. Port 1: config switch interface Port2: edit "port2" Case1: Violation Occurs (Same Port):
S448ENTF2400xxxx # diagnose switch mac-address list | grep port1 port1* 111 a4:bb:6d:db:d2:ae 2025-06-20 11:11:40 disable
Note: Since MAC-2 is the second address on port 1, a MAC violation is triggered, and MAC-2 will not be learned on port 1. So, it is good
Case2: Violation Not Triggered (When MAC 1 is already learnt on port 1): If PC2 is connected on port 2, MAC2 gets learnt on the port. If PC1 is connected to port2, no new violation is visible: S448ENTF2400xxxx # diagnose switch mac-address list | grep port2
Note: Since MAC-1 is a static MAC on port 1, port 2 will not add MAC-1 when the PC is connected to port 2. So, violation will not happen. It is expected.
S448ENTF24000xxx # get switch mac-limit-violations all
Note: The same MAC can be in different VLANs, so the MAC number will exceed 2, and a violation will occur. It is expected. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.