Network access (mac address authentication), Table 50, Network access – Brocade Communications Systems Brocate Ethernet Access Switch 6910 User Manual
Page 247

Brocade 6910 Ethernet Access Switch Configuration Guide
197
53-1002581-01
Network Access (MAC Address Authentication)
10
MAC Filter ID : Disabled
Last Intrusion MAC : NA
Last Time Detected Intrusion MAC : NA
Console#
This example shows information about a detected intrusion.
Console#show port security interface ethernet 1/2
Global Port Security Parameters
Secure MAC aging mode : Disabled
Port Security Details
Port : 1/2
Port Security : Enabled
Port Status : SecureUp
Intrusion Action : None
Max-MAC-Count : 0
Current MAC Count : 0
MAC Filter ID : 2
Last Intrusion MAC : 00-10-22-00-00-01
Last Time Detected Intrusion MAC : 2010/7/29 15:13:03
Console#
Network Access (MAC Address Authentication)
Network Access authentication controls access to the network by authenticating the MAC address
of each host that attempts to connect to a switch port. Traffic received from a specific MAC address
is forwarded by the switch only if the source MAC address is successfully authenticated by a central
RADIUS server. While authentication for a MAC address is in progress, all traffic is blocked until
authentication is completed. Once successfully authenticated, the RADIUS server may optionally
assign VLAN and QoS settings for the switch port.
TABLE 50
Network Access Commands
Command
Function
Mode
Enables MAC address aging
GC
Adds a MAC address to a filter table
GC
mac- authentication reauth-time
Sets the time period after which a connected MAC address must be
re-authenticated
GC
Enables the dynamic quality of service feature
IC
Enables dynamic VLAN assignment from a RADIUS server
IC
Specifies the guest VLAN
IC
Enables the link detection feature
IC
network-access link-detection
link-down
Configures the link detection feature to detect and act upon
link-down events
IC
network-access link-detection
link-up
Configures the link detection feature to detect and act upon link-up
events
IC
network-access link-detection
link-up-down
Configures the link detection feature to detect and act upon both
link-up and link-down events
IC
Sets the maximum number of MAC addresses that can be
authenticated on a port via all forms of authentication
IC