<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Mac based port security and removing / modifying configuration in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40248#M9048</link>
    <description>&lt;P&gt;We are still looking for an easy way to bind mac addresses (either 1 or multiple) to ports, so that other devices will not connect to that port if connected to it, or in line…&amp;nbsp;or people just cant move ports without us easily resetting that binding.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a lot of Cisco 3750x series, going EOL 2021.&amp;nbsp; We have a lot of money to invest in switching in the next 3 years, and with no response on this I think I will cross shop Cisco and Arista instead of Cisco and Extreme.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its sad there is lack of participation here and a complete utter disregard for the customer.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 17 Oct 2019 00:39:00 GMT</pubDate>
    <dc:creator>Keith9</dc:creator>
    <dc:date>2019-10-17T00:39:00Z</dc:date>
    <item>
      <title>Mac based port security and removing / modifying configuration</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40240#M9040</link>
      <description>I was trying to experiment with the EXOS version of what we do on our Cisco switches which is mac-address based security tied to a port.&lt;BR /&gt;
&lt;BR /&gt;
Sometimes we will use the following cisco commands on a port for example:&lt;BR /&gt;
 switchport port-security maximum 2&lt;BR /&gt;
 switchport port-security mac-address sticky&lt;BR /&gt;
 switchport port-security mac-address sticky 484d.7e00.0000 vlan access&lt;BR /&gt;
 switchport port-security mac-address sticky 0004.f200.0001 vlan voice&lt;BR /&gt;
&lt;BR /&gt;
Really we just type in the first two lines, and the switch automatically fills in the lines with the mac addresses as they are learned.  If you plug a different device in, the port shuts down.  If you plug one of those devices into a different port on the switch, the port shuts down.  If moving devices or swapping devices we just issue a no in front of the command with the mac address we want to remove, after the cable is unplugged.&lt;BR /&gt;
&lt;BR /&gt;
So I have a laptop here with two USB nics and I just want to try the EXOS equivalent of this, but limit it to learning one mac address, so I can verify with my second nic that the port will shut down.&lt;BR /&gt;
&lt;BR /&gt;
I first found this on gtac kb:&lt;BR /&gt;
configure port 2 vlan Default limit-learning 1 action stop-learning&lt;BR /&gt;
However I get a network connection with either USB nic and sucessful pings.  So it doesn't appear to be stoping anything.&lt;BR /&gt;
&lt;BR /&gt;
Then I found this one on gtac kb:&lt;BR /&gt;
configure mac-locking ports 2 first-arrival limit-learning 1&lt;BR /&gt;
However the first command above is still on port 2 on this test switch, see below:&lt;BR /&gt;
* X450G2-24p-G4.102 # sh configuration | grep learning&lt;BR /&gt;
configure port 2 vlan Default limit-learning 1 action stop-learning&lt;BR /&gt;
configure mac-locking ports 2 first-arrival limit-learning 1&lt;BR /&gt;
How can I make the first line "go away"?  I tried unconfigure port 2 vlan Default limit-learning 1 action stop-learning and it was invalid.&lt;BR /&gt;
&lt;BR /&gt;
Also can you steer me in the right direction how to accomplish (and maintain) the equivalant Cisco feature on EXOS?&lt;BR /&gt;
&lt;BR /&gt;
I eventually want to get this working in Netsight under Control with our nac VM.  Were a very new install and though I have stuff in there on this test switch, it doesn't block traffic.  I'm envisioning an easy to use and maintain place for the entire IT department of 6 to go in and add or remove mac addresses to a list.  Basically if your mac address is in that list, you are on the network.  If not, the port goes dead.&lt;BR /&gt;
&lt;BR /&gt;
Thanks!&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Jun 2018 20:31:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40240#M9040</guid>
      <dc:creator>kjstech</dc:creator>
      <dc:date>2018-06-07T20:31:00Z</dc:date>
    </item>
    <item>
      <title>RE: Mac based port security and removing / modifying configuration</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40241#M9041</link>
      <description>Hello Kjstech,&lt;BR /&gt;
&lt;BR /&gt;
You can remove that command by using the following:&lt;BR /&gt;
&lt;BR /&gt;
"configure port 2 vlan default unlimited-learning"&lt;BR /&gt;
&lt;BR /&gt;
In order to configure this and not have the action as "stop-learning" you will have to choose an option:&lt;BR /&gt;
&lt;BR /&gt;
configure port 2 vlan default limit-learning 1 action blackhole&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Jun 2018 20:50:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40241#M9041</guid>
      <dc:creator>Patrick_Voss</dc:creator>
      <dc:date>2018-06-07T20:50:00Z</dc:date>
    </item>
    <item>
      <title>RE: Mac based port security and removing / modifying configuration</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40242#M9042</link>
      <description>Ok I was able to undo that  Looks like the second command does what I would expect.&lt;BR /&gt;
The first NIC connected works.  Switching the cable to the other nic does not get an IP address, nor ping.  Odd though in sh log there was nothing logged for this event.&lt;BR /&gt;
&lt;BR /&gt;
Is one way better than the other, or is this two ways to accomplish the same thing?&lt;BR /&gt;
&lt;BR /&gt;
configure port 2 vlan default limit-learning 1 action blackhole&lt;BR /&gt;
 vs&lt;BR /&gt;
configure mac-locking ports 2 first-arrival limit-learning 1&lt;BR /&gt;
&lt;BR /&gt;
Right now I have mac-locking on, but how do I maintain that.  Lets say I replace or move a device.  Unconfigure mac-locking says invalid input detected at marker.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Jun 2018 21:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40242#M9042</guid>
      <dc:creator>kjstech</dc:creator>
      <dc:date>2018-06-07T21:03:00Z</dc:date>
    </item>
    <item>
      <title>RE: Mac based port security and removing / modifying configuration</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40243#M9043</link>
      <description>Actually it didn't work, it was my laptop.  The usb nic doesn't work in the right usb port.  Both USB nics only work in the left usb port so I can only use one at a time.&lt;BR /&gt;
&lt;BR /&gt;
Anyway I thought I had to do more configuration, like tell the port WHAT to do after it reached its limit, and also actually ENABLE the feature.  I did that, but it still doesn't do anything.&lt;BR /&gt;
configure mac-locking ports 2 learn-limit-action disable-port&lt;BR /&gt;
enable mac-locking ports 2&lt;BR /&gt;
And how about logging, well I tried this:&lt;BR /&gt;
configure mac-locking ports 1-24 log on&lt;BR /&gt;
configure mac-locking ports 2 trap violation on&lt;BR /&gt;
MAC locking is globally disabled.    Port   MAC  Trap     Log      FA    Limit    Link   Max Max  Last Violating         Lock Thr|Viol Thr|Viol Aging Action   Down   Stc FA   MAC Address         Stat                         Cfg|Stat Action  -----  ---- -------- -------- ----- -------- ------ --- ---  -----------------  1      dis  off|off  off|on   dis   ena|ena  clear   64 600  00:00:00:00:00:00  2      ena  off|on   off|on   dis   dis|ena  clear   64   1  00:00:00:00:00:00 &lt;BR /&gt;
&lt;BR /&gt;
Still both usb nics work and get network access.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Jun 2018 21:16:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40243#M9043</guid>
      <dc:creator>kjstech</dc:creator>
      <dc:date>2018-06-07T21:16:00Z</dc:date>
    </item>
    <item>
      <title>RE: Mac based port security and removing / modifying configuration</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40244#M9044</link>
      <description>I'm wondering if mac locking means it will learn 1 mac address as shown above, but lets say I try to pass through a phone, or heck, connect a downstream switch with a bunch of other devices on it.  I'm thinking it doesn't in a sense "Marry" or "bind" a particular mac address on the port, but it limites the number of simulatanous mac addresses that can communicate on the port at the same time.  Thats why I always have access since I'm just plugging it into a laptop.&lt;BR /&gt;
&lt;BR /&gt;
I just undid all of that configuration and I will go down exploring the avenue of configure port 2 vlan default limit-learning 1 action blackhole</description>
      <pubDate>Thu, 07 Jun 2018 21:16:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40244#M9044</guid>
      <dc:creator>kjstech</dc:creator>
      <dc:date>2018-06-07T21:16:00Z</dc:date>
    </item>
    <item>
      <title>RE: Mac based port security and removing / modifying configuration</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40245#M9045</link>
      <description>kjstech,&lt;BR /&gt;
&lt;BR /&gt;
Your timing is impeccable because I am working on mac locking with another customer in our lab. Based on the configuration it looks like the configure port command is on a per port and VLAN basis where mac locking is done at the overall port level and you can log and trap if you want.&lt;BR /&gt;
&lt;BR /&gt;
I will let you know more info once I find it during my testing.</description>
      <pubDate>Thu, 07 Jun 2018 22:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40245#M9045</guid>
      <dc:creator>Patrick_Voss</dc:creator>
      <dc:date>2018-06-07T22:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Mac based port security and removing / modifying configuration</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40246#M9046</link>
      <description>Hello,&lt;BR /&gt;
&lt;BR /&gt;
I am wondering what &lt;USER-MENTION data-id="3189230"&gt;@kjstech&lt;/USER-MENTION&gt;  and &lt;USER-MENTION data-id="7481957"&gt;@Patrick Voss&lt;/USER-MENTION&gt; came up with for making this work, as I am on a similar journey.  Basically, I would like to pin the current MAC addresses to a port (what ever is plugged in right now) and if a new device is attached to that port, send it to the blackhole.  If we need to connect a new device to the port, we would need to clear the entry to allow it to be connected to the port.</description>
      <pubDate>Wed, 20 Mar 2019 01:07:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40246#M9046</guid>
      <dc:creator>Bruce_Garlock</dc:creator>
      <dc:date>2019-03-20T01:07:00Z</dc:date>
    </item>
    <item>
      <title>RE: Mac based port security and removing / modifying configuration</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40247#M9047</link>
      <description>It doesn’t look like Patrick ever replied what he found during his testing.  I would like a really easy and simple way to approach Mac based port security exactly like Cisco.  The ports should be configured, allow 1 or 2 Mac addresses on it, then deny anything else on that port.  If the device has to be replaced or move, we would want a simple one liner command to clear the mac’s and allow the port to relearn and allow the next device that connects. &lt;BR /&gt;
&lt;BR /&gt;
We we have a reason to allow 2 macs (many PC’s are connected through a Polycom phone), or in some cases multiple macs (like someone running VMware workstation with multiple machines).&lt;BR /&gt;
&lt;BR /&gt;
I really hope someone has a way to easily replicate this Cisco bread and butter functionality on XOS.  I have some older Cisco switches in some access closets hitting EOL soon and although I would consider replacing them with Extreme switches, the lack of Mac based port security has me looking at new Catalyst 9300’s.  Don’t get me wrong, we love our Extreme switches at the core which do all of our L3, OSPF and aggregation.</description>
      <pubDate>Wed, 20 Mar 2019 08:31:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40247#M9047</guid>
      <dc:creator>Keith9</dc:creator>
      <dc:date>2019-03-20T08:31:00Z</dc:date>
    </item>
    <item>
      <title>RE: Mac based port security and removing / modifying configuration</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40248#M9048</link>
      <description>&lt;P&gt;We are still looking for an easy way to bind mac addresses (either 1 or multiple) to ports, so that other devices will not connect to that port if connected to it, or in line…&amp;nbsp;or people just cant move ports without us easily resetting that binding.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a lot of Cisco 3750x series, going EOL 2021.&amp;nbsp; We have a lot of money to invest in switching in the next 3 years, and with no response on this I think I will cross shop Cisco and Arista instead of Cisco and Extreme.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its sad there is lack of participation here and a complete utter disregard for the customer.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2019 00:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40248#M9048</guid>
      <dc:creator>Keith9</dc:creator>
      <dc:date>2019-10-17T00:39:00Z</dc:date>
    </item>
    <item>
      <title>RE: Mac based port security and removing / modifying configuration</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40249#M9049</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for EOS, devices, how to configure sticky learning mode in the port?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards!&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2020 05:45:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/mac-based-port-security-and-removing-modifying-configuration/m-p/40249#M9049</guid>
      <dc:creator>Jose_Sanchez_As</dc:creator>
      <dc:date>2020-12-31T05:45:00Z</dc:date>
    </item>
  </channel>
</rss>

