Figure 13: Example 4; Unauthorized Mac - Avaya ERS 3500 Technical Configuration Manual

Mac address based security
Hide thumbs Also See for ERS 3500:
Table of Contents

Advertisement

MAC Address
Vid
----------------- ---- ------- -------
00-C0-95-C8-9A-62
40 Dynamic Port:14 (previously was on port 12)
00-C0-95-C8-FF-12
40 Dynamic Port:13 (previously was on port 11)
00-E0-16-57-6E-8A
40 Dynamic Trunk:1
Verify IP connectivity between the Router and the end stations again
Router#% ping 30.0.0.2; ping 30.0.0.3; ping 40.0.0.121; ping 40.0.0.122
30.0.0.2 is alive
30.0.0.3 is alive
40.0.0.121 is alive
40.0.0.122 is alive
3.4.3
Checking Violations
3.4.3.1 Unauthorized MAC
The unauthorized device is not able to send any traffic into the network; however it is still able to see
broadcast and unknown traffic flowing in VLAN 30; if this is undesired the MAC Security should be
configured to partition the port upon an access violation.
Verify log file on switch
Avaya-ERS-Switch# show log
Type Time
November 2010
Type
Source

Figure 13: Example 4; unauthorized MAC

Idx
Src Message
Avaya Inc. – Internal Distribution
avaya.com
70

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ers 2500Ers 4800Ers 4500Vsp 7000Ers 5600Ers 5500

Table of Contents