Permit specific MAC address per port
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎06-06-2017 07:31 PM
I am trying to figure out how to enable port security on Extreme Summit 300-24 switches. Cisco provides this as a configurable feature. I don't believe Extreme has a comparable feature so I have been trying to use access lists to perform the same basic function. I have no problem creating the necessary access-msk and acl to permit a specific source mac address and apply it to a specific port but I believe I also have to create a deny all source mac acl entry to implicitly deny all other source mac addresses. It does not appear as though I can use wildcard for the implicit deny.
Does anyone have knowledge on how to accomplish this?
Thank you
Does anyone have knowledge on how to accomplish this?
Thank you
4 REPLIES 4
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎06-08-2017 08:03 AM
Hi Tom,
In ExtremeWare you can enable lock learning on a port to lock the currently learned MAC address and not allow any other MACs to be learned on the specified port. The syntax for the command with its options is as follows:
configure ports vlan [limit-learning | lock-learning |
unlimited-learning | unlock-learning]
For example if you would like to locked the learned MAC for a device attached to port 1 that is part, the command will be:
configure ports 1 vlan lock-learning
Please let us know if you have any questions.
Thank you.
Best regards,
Andrew
In ExtremeWare you can enable lock learning on a port to lock the currently learned MAC address and not allow any other MACs to be learned on the specified port. The syntax for the command with its options is as follows:
configure ports vlan
unlimited-learning | unlock-learning]
For example if you would like to locked the learned MAC for a device attached to port 1 that is part, the command will be:
configure ports 1 vlan
Please let us know if you have any questions.
Thank you.
Best regards,
Andrew
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎06-08-2017 08:03 AM
Hi Tom,
Thanks for the update. I am glad that it worked for you.
Best regards,
Andrew
Thanks for the update. I am glad that it worked for you.
Best regards,
Andrew
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎06-08-2017 08:03 AM
Andrew,
Tried it and it works great.
It does not get much easier than that!
Thank you
Tom
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎06-08-2017 07:33 AM
Hi Tom,
did you look into the Secure MAC feature?
Thanks,
Erik
did you look into the Secure MAC feature?
You can configure a MAC address to be permitted only on a specified set of ports. Secure MAC addresses, if learned, are still aged out like other dynamically learned entries, and can also be cleared. To configure the authorized set of ports on which the MAC address should be permitted, use the following command:Regarding the explicit deny, you could deny all IP traffic without checking the MAC address.
create fdbentry secure-macvlan ports
To clear all the dynamic, non-permanent blackholed entries that were created as a result of secure MAC violations, use the following command:
clear fdb blackhole
To see the number of blackhole entries created as a result of secure MAC violations, use the following command:
show vlansecurity
The output of the show fdb permanent command indicates secure MAC addresses.
Thanks,
Erik
