Sign In
Upload
Manuals
Brands
Avaya Manuals
Network Router
ERS 4800
Avaya ERS 4800 Manuals
Manuals and User Guides for Avaya ERS 4800. We have
1
Avaya ERS 4800 manual available for free PDF download: Technical Configuration Manual
Avaya ERS 4800 Technical Configuration Manual (108 pages)
MAC Address Based Security
Brand:
Avaya
| Category:
Network Router
| Size: 3.25 MB
Table of Contents
Table of Contents
4
Figures
5
Tables
5
1 Introduction
7
Table 1: MAC Security Support Across Avaya Switch Family Types
7
Table 2: MAC Security Capability Vs. Mode Matrix
10
Table 3: MAC Security Config Commands Vs. Mode Matrix
11
2 Base Configuration Setup
12
Figure 1: Base Setup
12
Ensuring MAC Security Can Never Accidentally be Enabled on Uplinks
13
Disabling SNMP Write Access Just for MAC Security Configuration
15
3 Regular MAC Security Examples
17
Controlling Exactly Which MAC Is Allowed to Use each and Every Access Port
17
Figure 2: Regular MAC Security; Example 1
17
Figure 3: Example 1; Unauthorized MAC on Non-Provisioned Port
26
Figure 4: Example 1; Unauthorized MAC on Provisioned Port
28
Figure 5: Example 1; Unauthorized MAC Sharing Connection with Authorized MAC
30
Figure 6: Example 1; Unauthorized MAC Moving to a Different Port
32
Ensuring that no New Unauthorized Device (MAC) Is Added to the Network
34
Figure 7: Regular MAC Security; Example 2
34
Figure 8: Example 2; a New Device Is Added to the Network
43
Using MAC Security to Tie down Server Macs Using Active/Standby Nics
49
Figure 9: MAC-Security with Active-Standby Nics; Example 3
49
Figure 10: Example 3; Servers Switch over to Backup NIC
60
Figure 11: Example 3; Unauthorized Device Takes Server Standby NIC Connection
61
Achieving MAC Based Vlans Using MAC Security
63
Figure 12: VLAN Based MAC-Security; Example 4
63
Figure 13: Example 4; Unauthorized MAC
70
Figure 14: Example 4; Authorized Macs in Wrong VLAN
72
4 Auto-Learning with Maxmacs Example
74
Ensuring that Every Access Port Is Used by One and Only One Device
74
Figure 15: Auto-Learning with Maxmacs; Example 5
74
Figure 16: Example 5; an Unauthorized Hub/Switch Is Connected to the Network
83
Figure 17: Example 5; an Unauthorized WLAN AP Is Connected to the Network
84
5 Auto-Learning with Sticky-MAC Example
86
MAC Security Without Having to Pre-Provision Ports When New Devices Added
86
Figure 18: MAC Security Without any Provisioning of New Devices; Example 6
86
Figure 19: Example 6; a New Device Is Added to the Network
97
Figure 20: Example 6; Unauthorized MAC on Provisioned Port
101
Figure 21: Example 6; Unauthorized MAC Sharing Connection with Authorized MAC
103
Figure 22: Example 6; Unauthorized MAC Moving to a Different Port
106
Advertisement
Advertisement
Related Products
Avaya ERS 4500
Avaya ERS 460
Avaya ERS 470
Avaya ERS 45 Series
Avaya ERS 48 Series
Avaya ERS 4550T
Avaya ERS 4526FX
Avaya ERS 4548GT
Avaya ERS 4526GT
Avaya ERS 4526T
Avaya Categories
IP Phone
Telephone
Server
Switch
Gateway
More Avaya Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL