Brocade Communications Systems Brocade ICX 6650 6650 User Manual

Page 9

Advertising
background image

Brocade ICX 6650 Security Configuration Guide

ix

53-1002601-01

Displaying 802.1X information. . . . . . . . . . . . . . . . . . . . . . . . . . . . .184

Displaying 802.1X configuration information . . . . . . . . . . . . .184
Displaying 802.1X statistics . . . . . . . . . . . . . . . . . . . . . . . . . . .187
Clearing 802.1X statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . .188
Displaying dynamically assigned VLAN information . . . . . . . .188
Displaying information about dynamically applied
MAC address filters and IP ACLs. . . . . . . . . . . . . . . . . . . . . . . .1
89
Displaying 802.1X multiple-host
authentication information . . . . . . . . . . . . . . . . . . . . . . . . . . . .
191

Sample 802.1X configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . .196

Point-to-point configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . .196
Hub configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .197
802.1X authentication with dynamic VLAN assignment . . . . .198

Multi-device port authentication and 802.1X
security on the same port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
99

Chapter 7

MAC Port Security

MAC port security overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202

Local and global resources used for MAC port security . . . . .202
Configuration notes and feature limitations
for MAC port security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
202

MAC port security configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . .203

Enabling the MAC port security feature . . . . . . . . . . . . . . . . . .203
Setting the maximum number of secure
MAC addresses for an interface . . . . . . . . . . . . . . . . . . . . . . . .
204
Setting the port security age timer . . . . . . . . . . . . . . . . . . . . . .204
Specifying secure MAC addresses . . . . . . . . . . . . . . . . . . . . . .205
Autosaving secure MAC addresses to the
startup configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
205
Specifying the action taken when a security
violation occurs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
206

Clearing port security statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . .207

Clearing restricted MAC addresses. . . . . . . . . . . . . . . . . . . . . .207
Clearing violation statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . .207

Displaying port security information . . . . . . . . . . . . . . . . . . . . . . . .208

Displaying port security settings . . . . . . . . . . . . . . . . . . . . . . . .208
Displaying the secure MAC addresses . . . . . . . . . . . . . . . . . . .208
Displaying port security statistics . . . . . . . . . . . . . . . . . . . . . . .209
Displaying restricted MAC addresses on a port . . . . . . . . . . . .210

Chapter 8

MAC-based VLANs

MAC-based VLAN overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

Static and dynamic hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211
MAC-based VLAN feature structure . . . . . . . . . . . . . . . . . . . . .212

Advertising