beautypg.com

Defining mac address filters, Configuring dynamic vlan assignment – Brocade FastIron Ethernet Switch Security Configuration Guide User Manual

Page 261

background image

Syntax: [no] mac-authentication auth-fail-action block-traffic

Dropping traffic from non-authenticated MAC addresses is the default behavior when multi-device port
authentication is enabled.

Generating traps for multi-device port authentication

You can enable and disable SNMP traps for multi-device port authentication. SNMP traps are enabled
by default.

To enable SNMP traps for multi-device port authentication after they have been disabled, enter the
following command.

device(config)#snmp-server enable traps mac-authentication

Syntax: [no] snmp-server enable traps mac-authentication

Use the no form of the command to disable SNMP traps for multi-device port authentication.

Defining MAC address filters

You can specify MAC addresses that do not have to go through multi-device port authentication. These
MAC addresses are considered pre-authenticated, and are not subject to RADIUS authentication. To do
this, you can define MAC address filters that specify the MAC addresses to exclude from multi-device
port authentication.

You should use a MAC address filter when the RADIUS server itself is connected to an interface where
multi-device port authentication is enabled. If a MAC address filter is not defined for the MAC address of
the RADIUS server and applied on the interface, the RADIUS authentication process would fail since
the device would drop all packets from the RADIUS server itself.

For example, the following command defines a MAC address filter for address 0000.0058.aca4.

device(config)#mac-authentication mac-filter 1 0000.0058.aca4

Syntax: [no] mac-authentication mac-filter filter

The following commands apply the MAC address filter on an interface so that address 0000.0058.aca4
is excluded from multi-device port authentication.

device(config)#interface e 3/1

device(config-if-e1000-3/1)#mac-authentication apply-mac-auth-filter 1

Syntax: [no] mac-authentication apply-mac-auth-filter filter-id

Configuring dynamic VLAN assignment

An interface can be dynamically assigned to one or more VLANs based on the MAC address learned on
that interface. When a MAC address is successfully authenticated, the RADIUS server sends the
Brocade device a RADIUS Access-Accept message that allows the Brocade device to forward traffic
from that MAC address. The RADIUS Access-Accept message can also contain attributes set for the
MAC address in its access profile on the RADIUS server.

If one of the attributes in the Access-Accept message specifies one or more VLAN identifiers, and the
VLAN is available on the Brocade device, the port is moved from its default VLAN to the specified
VLAN.

Generating traps for multi-device port authentication

FastIron Ethernet Switch Security Configuration Guide

261

53-1003088-03