Overview of mac port security, Violation actions, Chapter 33 – Brocade BigIron RX Series Configuration Guide User Manual

Page 1107: Using the mac port, Security feature and transparent port flooding, Using the mac, Security feature and transparent port floodi ng

Advertising
background image

BigIron RX Series Configuration Guide

1029

53-1002484-04

Chapter

33

Using the MAC Port Security Feature

and Transparent Port Flooding

In this chapter

Overview of MAC port security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029

Configuring the MAC Port Security feature . . . . . . . . . . . . . . . . . . . . . . . 1030

Defining security violation actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1034

Understanding the rules for violation action configuration . . . . . . . . . . . 1037

Re-enabling an interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1038

Displaying MAC Port Security information . . . . . . . . . . . . . . . . . . . . . . . . 1039

Transparent port flooding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1043

This chapter discusses the MAC Port Security and transparent port flooding features.

Overview of MAC port security

The MAC Port Security feature restricts unauthorized access to an interface by limiting and
identifying MAC addresses that are allowed to access an Ethernet interface on a device. You can
configure the BigIron RX with a limited number of “secure” MAC addresses on an interface. The
interface will forward only packets with source MAC addresses that match these secure addresses.
The secure MAC addresses can be specified manually (static), or the device can learn them
automatically (dynamic).

An interface can store up to the maximum number of secure MAC addresses. If the maximum
number of secure MAC addresses are learned and the interface receives a packet with a source
MAC address that is different from any of the secure learned MAC addresses, the address is
considered a security violation.

NOTE

The MAC Port Security feature applies only to Ethernet interfaces. It is not available on loopback,
virtual routing (ve) or other interface types.

Violation actions

When a security violation occurs, a Syslog entry is generated. In addition, the device takes one of
the following actions:

Shuts down the interface, either permanently or for a specified amount of time. This is the
default.

Drops packets from the unauthorized MAC address, but allows packets from the secure MAC
addresses. The interface remains enabled.

Denies the packet from the unauthorized MAC address, but allows packets from secure MAC
addresses. The interface remains enabled.

Advertising