<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Permit specific MAC address per port in Security</title>
    <link>https://community.extremenetworks.com/t5/security/permit-specific-mac-address-per-port/m-p/27938#M75</link>
    <description>Hi Tom,&lt;BR /&gt;
&lt;BR /&gt;
did you look into the &lt;I&gt;Secure MAC&lt;/I&gt; feature?&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;You can configure a MAC address to be permitted only on a specified set of ports. Secure MAC addresses, if learned, are still aged out like other dynamically learned entries, and can also be cleared. To configure the authorized set of ports on which the MAC address should be permitted, use the following command:&lt;BR /&gt;
&lt;BR /&gt;
create fdbentry secure-mac &lt;MAC_ADDRESS&gt; vlan &lt;VLAN name=""&gt; ports &lt;BR /&gt;
&lt;BR /&gt;
To clear all the dynamic, non-permanent blackholed entries that were created as a result of secure MAC violations, use the following command:&lt;BR /&gt;
&lt;BR /&gt;
clear fdb blackhole&lt;BR /&gt;
&lt;BR /&gt;
To see the number of blackhole entries created as a result of secure MAC violations, use the following command:&lt;BR /&gt;
&lt;BR /&gt;
show vlan &lt;VLAN_NAME&gt; security&lt;BR /&gt;
&lt;BR /&gt;
The output of the show fdb permanent command indicates secure MAC addresses.&lt;BR /&gt;
&lt;/VLAN_NAME&gt;&lt;/VLAN&gt;&lt;/MAC_ADDRESS&gt;&lt;/BLOCKQUOTE&gt;Regarding the explicit deny, you could deny all IP traffic without checking the MAC address.&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
    <pubDate>Thu, 08 Jun 2017 14:33:00 GMT</pubDate>
    <dc:creator>Erik_Auerswald</dc:creator>
    <dc:date>2017-06-08T14:33:00Z</dc:date>
    <item>
      <title>Permit specific MAC address per port</title>
      <link>https://community.extremenetworks.com/t5/security/permit-specific-mac-address-per-port/m-p/27937#M74</link>
      <description>I am trying to figure out how to enable port security on Extreme Summit 300-24 switches. Cisco provides this as a configurable feature. I don't believe Extreme has a comparable feature so I have been trying to use access lists to perform the same basic function. I have no problem creating the necessary access-msk and acl to permit a specific source mac address and apply it to a specific port but I believe I also have to create a deny all source mac acl entry to implicitly deny all other source mac addresses. It does not appear as though I can use wildcard for the implicit deny. &lt;BR /&gt;
Does anyone have knowledge on how to accomplish this?&lt;BR /&gt;
&lt;BR /&gt;
Thank you&lt;BR /&gt;</description>
      <pubDate>Wed, 07 Jun 2017 02:31:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/security/permit-specific-mac-address-per-port/m-p/27937#M74</guid>
      <dc:creator>Tom_Gavin</dc:creator>
      <dc:date>2017-06-07T02:31:00Z</dc:date>
    </item>
    <item>
      <title>RE: Permit specific MAC address per port</title>
      <link>https://community.extremenetworks.com/t5/security/permit-specific-mac-address-per-port/m-p/27938#M75</link>
      <description>Hi Tom,&lt;BR /&gt;
&lt;BR /&gt;
did you look into the &lt;I&gt;Secure MAC&lt;/I&gt; feature?&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;You can configure a MAC address to be permitted only on a specified set of ports. Secure MAC addresses, if learned, are still aged out like other dynamically learned entries, and can also be cleared. To configure the authorized set of ports on which the MAC address should be permitted, use the following command:&lt;BR /&gt;
&lt;BR /&gt;
create fdbentry secure-mac &lt;MAC_ADDRESS&gt; vlan &lt;VLAN name=""&gt; ports &lt;BR /&gt;
&lt;BR /&gt;
To clear all the dynamic, non-permanent blackholed entries that were created as a result of secure MAC violations, use the following command:&lt;BR /&gt;
&lt;BR /&gt;
clear fdb blackhole&lt;BR /&gt;
&lt;BR /&gt;
To see the number of blackhole entries created as a result of secure MAC violations, use the following command:&lt;BR /&gt;
&lt;BR /&gt;
show vlan &lt;VLAN_NAME&gt; security&lt;BR /&gt;
&lt;BR /&gt;
The output of the show fdb permanent command indicates secure MAC addresses.&lt;BR /&gt;
&lt;/VLAN_NAME&gt;&lt;/VLAN&gt;&lt;/MAC_ADDRESS&gt;&lt;/BLOCKQUOTE&gt;Regarding the explicit deny, you could deny all IP traffic without checking the MAC address.&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Thu, 08 Jun 2017 14:33:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/security/permit-specific-mac-address-per-port/m-p/27938#M75</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-06-08T14:33:00Z</dc:date>
    </item>
    <item>
      <title>RE: Permit specific MAC address per port</title>
      <link>https://community.extremenetworks.com/t5/security/permit-specific-mac-address-per-port/m-p/27939#M76</link>
      <description>Hi Tom,&lt;BR /&gt;
&lt;BR /&gt;
In ExtremeWare you can enable lock learning on a port to lock the currently learned MAC address and not allow any other MACs to be learned on the specified port. The syntax for the command with its options is as follows:&lt;BR /&gt;
&lt;BR /&gt;
configure ports  vlan &lt;VLAN name=""&gt; [limit-learning &lt;NUMBER&gt; | lock-learning | &lt;BR /&gt;
unlimited-learning | unlock-learning]&lt;BR /&gt;
&lt;BR /&gt;
For example if you would like to locked the learned MAC for a device attached to port 1 that is part, the command will be:&lt;BR /&gt;
&lt;BR /&gt;
configure ports 1 vlan &lt;VLAN name=""&gt; lock-learning&lt;BR /&gt;
&lt;BR /&gt;
Please let us know if you have any questions.&lt;BR /&gt;
Thank you.&lt;BR /&gt;
&lt;BR /&gt;
Best regards,&lt;BR /&gt;
Andrew &lt;BR /&gt;
&lt;BR /&gt;&lt;/VLAN&gt;&lt;/NUMBER&gt;&lt;/VLAN&gt;</description>
      <pubDate>Thu, 08 Jun 2017 15:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/security/permit-specific-mac-address-per-port/m-p/27939#M76</guid>
      <dc:creator>Andrew_Imam</dc:creator>
      <dc:date>2017-06-08T15:03:00Z</dc:date>
    </item>
    <item>
      <title>RE: Permit specific MAC address per port</title>
      <link>https://community.extremenetworks.com/t5/security/permit-specific-mac-address-per-port/m-p/27940#M77</link>
      <description>&lt;BR /&gt;
Andrew,&lt;BR /&gt;
&lt;BR /&gt;
Tried it and it works great.&lt;BR /&gt;
It does not get much easier than that! &lt;BR /&gt;
&lt;BR /&gt;
Thank you&lt;BR /&gt;
Tom</description>
      <pubDate>Thu, 08 Jun 2017 15:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/security/permit-specific-mac-address-per-port/m-p/27940#M77</guid>
      <dc:creator>Tom_Gavin</dc:creator>
      <dc:date>2017-06-08T15:03:00Z</dc:date>
    </item>
    <item>
      <title>RE: Permit specific MAC address per port</title>
      <link>https://community.extremenetworks.com/t5/security/permit-specific-mac-address-per-port/m-p/27941#M78</link>
      <description>Hi Tom,&lt;BR /&gt;
&lt;BR /&gt;
Thanks for the update. I am glad that it worked for you.&lt;BR /&gt;
&lt;BR /&gt;
Best regards,&lt;BR /&gt;
Andrew&lt;BR /&gt;</description>
      <pubDate>Thu, 08 Jun 2017 15:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/security/permit-specific-mac-address-per-port/m-p/27941#M78</guid>
      <dc:creator>Andrew_Imam</dc:creator>
      <dc:date>2017-06-08T15:03:00Z</dc:date>
    </item>
  </channel>
</rss>

