<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Port Security violation after eaps and arp-flush in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-security-violation-after-eaps-and-arp-flush/m-p/21507#M1532</link>
    <description>Below is the link to the KCS article explaining this feature:&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Q_A/What-is-the-command-to-restrict-unknown-unicast-flooding-during-EAPS-or-STP-failover" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Q_A/What-is-the-command-to-restrict-unknown-unicast-flooding-during-EAPS-or-STP-failover&lt;/A&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 22 Apr 2016 12:14:00 GMT</pubDate>
    <dc:creator>Senguttuvan__Ar</dc:creator>
    <dc:date>2016-04-22T12:14:00Z</dc:date>
    <item>
      <title>Port Security violation after eaps and arp-flush</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-security-violation-after-eaps-and-arp-flush/m-p/21503#M1528</link>
      <description>It's belong a Point to Point Connection over a EAPS-Ring. We have created a VMAN on the ring and add the port untagged on the vman.&lt;BR /&gt;
The cutomer have on his side a cisco with "switchport port-security maximum 1" defined.&lt;BR /&gt;
Now if the ring broken then the eaps send arp-flush and at the same time on the cisco-side/customer goes the port down because of more the 1 MAC &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt; &lt;BR /&gt;
Could someone explain me the write Setting on the customer / untag port side that the customer don't get more the 1 MAC ̈-Adresse from the port out in case of a ring broken or complete !&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="6c19b102294a49adaef5c71de09f2747_RackMultipart20160322-75922-18tm4qk-Port_violation_inline.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3855iF636D883D8352949/image-size/large?v=v2&amp;amp;px=999" role="button" title="6c19b102294a49adaef5c71de09f2747_RackMultipart20160322-75922-18tm4qk-Port_violation_inline.jpg" alt="6c19b102294a49adaef5c71de09f2747_RackMultipart20160322-75922-18tm4qk-Port_violation_inline.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="6c19b102294a49adaef5c71de09f2747_RackMultipart20160322-113015-brsjgr-Port_violation_01_inline.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5908i405C054BD021D157/image-size/large?v=v2&amp;amp;px=999" role="button" title="6c19b102294a49adaef5c71de09f2747_RackMultipart20160322-113015-brsjgr-Port_violation_01_inline.jpg" alt="6c19b102294a49adaef5c71de09f2747_RackMultipart20160322-113015-brsjgr-Port_violation_01_inline.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2016 00:49:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-security-violation-after-eaps-and-arp-flush/m-p/21503#M1528</guid>
      <dc:creator>Pa_Trick</dc:creator>
      <dc:date>2016-03-23T00:49:00Z</dc:date>
    </item>
    <item>
      <title>RE: Port Security violation after eaps and arp-flush</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-security-violation-after-eaps-and-arp-flush/m-p/21504#M1529</link>
      <description>When EAPS failover happens, packets gets flooded until the FDB's are re-learnt. If you don't want flooding to happen on a specific port, you could use the feature to disable unknown unicast flooding on the port. Command is as follows:&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;disable flooding [all_cast | broadcast | multicast | unicast] ports [port_list | all]&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
Please read the command reference guide for more details about this command.</description>
      <pubDate>Wed, 13 Apr 2016 10:09:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-security-violation-after-eaps-and-arp-flush/m-p/21504#M1529</guid>
      <dc:creator>Senguttuvan__Ar</dc:creator>
      <dc:date>2016-04-13T10:09:00Z</dc:date>
    </item>
    <item>
      <title>RE: Port Security violation after eaps and arp-flush</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-security-violation-after-eaps-and-arp-flush/m-p/21505#M1530</link>
      <description>Here are the links to the supporting product documentation Arun mentioned.&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="http://documentation.extremenetworks.com/exos_commands/exos_21_1/exos_commands_all/r_disable-flooding-ports.shtml" target="_blank" rel="nofollow noreferrer noopener"&gt;http://documentation.extremenetworks.com/exos_commands/exos_21_1/exos_commands_all/r_disable-floodin...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="http://documentation.extremenetworks.com/exos/exos_21_1/fdb/c_guidelines-for-enabling-or-disabling-egress-flooding.shtml" target="_blank" rel="nofollow noreferrer noopener"&gt;http://documentation.extremenetworks.com/exos/exos_21_1/fdb/c_guidelines-for-enabling-or-disabling-e...&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 13 Apr 2016 10:09:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-security-violation-after-eaps-and-arp-flush/m-p/21505#M1530</guid>
      <dc:creator>Ryan_Mathews</dc:creator>
      <dc:date>2016-04-13T10:09:00Z</dc:date>
    </item>
    <item>
      <title>RE: Port Security violation after eaps and arp-flush</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-security-violation-after-eaps-and-arp-flush/m-p/21506#M1531</link>
      <description>Thank you Aron and Mathews. This solve the problem.</description>
      <pubDate>Thu, 14 Apr 2016 13:33:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-security-violation-after-eaps-and-arp-flush/m-p/21506#M1531</guid>
      <dc:creator>Pa_Trick</dc:creator>
      <dc:date>2016-04-14T13:33:00Z</dc:date>
    </item>
    <item>
      <title>RE: Port Security violation after eaps and arp-flush</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-security-violation-after-eaps-and-arp-flush/m-p/21507#M1532</link>
      <description>Below is the link to the KCS article explaining this feature:&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Q_A/What-is-the-command-to-restrict-unknown-unicast-flooding-during-EAPS-or-STP-failover" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Q_A/What-is-the-command-to-restrict-unknown-unicast-flooding-during-EAPS-or-STP-failover&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 22 Apr 2016 12:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-security-violation-after-eaps-and-arp-flush/m-p/21507#M1532</guid>
      <dc:creator>Senguttuvan__Ar</dc:creator>
      <dc:date>2016-04-22T12:14:00Z</dc:date>
    </item>
  </channel>
</rss>

