Overview of mac port security, Violation actions, Chapter 33 – Brocade BigIron RX Series Configuration Guide User Manual
Page 1107: Using the mac port, Security feature and transparent port flooding, Using the mac, Security feature and transparent port floodi ng

BigIron RX Series Configuration Guide
1029
53-1002484-04
Chapter
33
Using the MAC Port Security Feature
and Transparent Port Flooding
In this chapter
•
Overview of MAC port security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029
•
Configuring the MAC Port Security feature . . . . . . . . . . . . . . . . . . . . . . . 1030
•
Defining security violation actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1034
•
Understanding the rules for violation action configuration . . . . . . . . . . . 1037
•
•
Displaying MAC Port Security information . . . . . . . . . . . . . . . . . . . . . . . . 1039
•
This chapter discusses the MAC Port Security and transparent port flooding features.
Overview of MAC port security
The MAC Port Security feature restricts unauthorized access to an interface by limiting and 
identifying MAC addresses that are allowed to access an Ethernet interface on a device. You can 
configure the BigIron RX with a limited number of “secure” MAC addresses on an interface. The 
interface will forward only packets with source MAC addresses that match these secure addresses. 
The secure MAC addresses can be specified manually (static), or the device can learn them 
automatically (dynamic). 
An interface can store up to the maximum number of secure MAC addresses. If the maximum 
number of secure MAC addresses are learned and the interface receives a packet with a source 
MAC address that is different from any of the secure learned MAC addresses, the address is 
considered a security violation.
NOTE
The MAC Port Security feature applies only to Ethernet interfaces. It is not available on loopback, 
virtual routing (ve) or other interface types.
Violation actions
When a security violation occurs, a Syslog entry is generated. In addition, the device takes one of 
the following actions: 
•
Shuts down the interface, either permanently or for a specified amount of time. This is the 
default.
•
Drops packets from the unauthorized MAC address, but allows packets from the secure MAC 
addresses. The interface remains enabled.
•
Denies the packet from the unauthorized MAC address, but allows packets from secure MAC 
addresses. The interface remains enabled.
