<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: block mac address command in switch XOS CLI in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/block-mac-address-command-in-switch-xos-cli/m-p/53495#M15060</link>
    <description>Bobby,&lt;BR /&gt;
&lt;BR /&gt;
it shouldn't matter if you make it ingress or egress however you should also be able to track down what port its coming in by using the command:&lt;BR /&gt;
&lt;BR /&gt;
show iparp 01:00:5E:00:E0:F1 &lt;BR /&gt;
&lt;BR /&gt;
that way you can block the mac address at it's source instead of trying to catch it later in the network.</description>
    <pubDate>Thu, 01 Jun 2017 20:25:00 GMT</pubDate>
    <dc:creator>Brian_Austin</dc:creator>
    <dc:date>2017-06-01T20:25:00Z</dc:date>
    <item>
      <title>block mac address command in switch XOS CLI</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/block-mac-address-command-in-switch-xos-cli/m-p/53491#M15056</link>
      <description>I took over an existing enterprise size extreme network, been getting already that people have threats basically sending to third world country IPs. There is not much on the GUI and been trying to hunt down the command to block the mac address in CLI.  I do see that were is a blackhole vlan, Im guessing it needs to be put into that vlan. Any info helps thanks!</description>
      <pubDate>Thu, 01 Jun 2017 18:55:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/block-mac-address-command-in-switch-xos-cli/m-p/53491#M15056</guid>
      <dc:creator>Bobby</dc:creator>
      <dc:date>2017-06-01T18:55:00Z</dc:date>
    </item>
    <item>
      <title>RE: block mac address command in switch XOS CLI</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/block-mac-address-command-in-switch-xos-cli/m-p/53492#M15057</link>
      <description>Bobby,&lt;BR /&gt;
&lt;BR /&gt;
You could create an access list to block the offending MAC on a port or VLAN. The following is an example of the ACL:&lt;BR /&gt;
&lt;BR /&gt;
entry block_MAC  {&lt;BR /&gt;
if {&lt;BR /&gt;
ethernet-source-address &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;01:00:5E:00:E0:F1&lt;/PRE&gt;&lt;/DIV&gt;;&lt;BR /&gt;
} then {&lt;BR /&gt;
deny;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
The following article explains how to create and apply the ACL to a port or VLAN:&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-create-and-apply-an-ACL-in-EXOS" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-create-and-apply-an-ACL-in-EXOS&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 01 Jun 2017 20:01:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/block-mac-address-command-in-switch-xos-cli/m-p/53492#M15057</guid>
      <dc:creator>Ty_Izzet</dc:creator>
      <dc:date>2017-06-01T20:01:00Z</dc:date>
    </item>
    <item>
      <title>RE: block mac address command in switch XOS CLI</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/block-mac-address-command-in-switch-xos-cli/m-p/53493#M15058</link>
      <description>Hi Taykin,&lt;BR /&gt;
&lt;BR /&gt;
How will XOS process the MAC blocking by using ACL, CPU based or ASIC based? Using blackhole is processed by ASIC right? Unfortunately, I don't know how to use blackhole without specifying the VLAN or make it works to al VLANs.&lt;BR /&gt;
&lt;BR /&gt;
Best regards,</description>
      <pubDate>Thu, 01 Jun 2017 20:01:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/block-mac-address-command-in-switch-xos-cli/m-p/53493#M15058</guid>
      <dc:creator>Mrxlazuardin</dc:creator>
      <dc:date>2017-06-01T20:01:00Z</dc:date>
    </item>
    <item>
      <title>RE: block mac address command in switch XOS CLI</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/block-mac-address-command-in-switch-xos-cli/m-p/53494#M15059</link>
      <description>sweet thanks!&lt;BR /&gt;
&lt;BR /&gt;
Does it matter if its egress or ingress?</description>
      <pubDate>Thu, 01 Jun 2017 20:08:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/block-mac-address-command-in-switch-xos-cli/m-p/53494#M15059</guid>
      <dc:creator>Bobby</dc:creator>
      <dc:date>2017-06-01T20:08:00Z</dc:date>
    </item>
    <item>
      <title>RE: block mac address command in switch XOS CLI</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/block-mac-address-command-in-switch-xos-cli/m-p/53495#M15060</link>
      <description>Bobby,&lt;BR /&gt;
&lt;BR /&gt;
it shouldn't matter if you make it ingress or egress however you should also be able to track down what port its coming in by using the command:&lt;BR /&gt;
&lt;BR /&gt;
show iparp 01:00:5E:00:E0:F1 &lt;BR /&gt;
&lt;BR /&gt;
that way you can block the mac address at it's source instead of trying to catch it later in the network.</description>
      <pubDate>Thu, 01 Jun 2017 20:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/block-mac-address-command-in-switch-xos-cli/m-p/53495#M15060</guid>
      <dc:creator>Brian_Austin</dc:creator>
      <dc:date>2017-06-01T20:25:00Z</dc:date>
    </item>
  </channel>
</rss>

