Configuring Secure Mac Addresses - HP FlexFabric 5700 Series Security Configuration Manual

Hide thumbs Also See for FlexFabric 5700 Series:
Table of Contents

Advertisement

blocked MAC address is restored to normal state after being blocked for 3 minutes. The interval is
fixed and cannot be changed.
disableport—Disables the port until you bring it up manually.
disableport-temporarily—Disables the port for a period of time. The period can be configured with
the port-security timer disableport command.
To configure the intrusion protection feature:
Step
1.
Enter system view.
2.
Enter Layer 2 Ethernet
interface view.
3.
Configure the intrusion
protection feature.
4.
Return to system view.
5.
(Optional.) Set the silence
timeout period during which a
port remains disabled.
NOTE:
On a port operating in either macAddressElseUserLoginSecure mode or
macAddressElseUserLoginSecureExt mode, intrusion protection is triggered only after both MAC
authentication and 802.1X authentication fail for the same frame.

Configuring secure MAC addresses

Secure MAC addresses are configured or learned in autoLearn mode. If the secure MAC addresses are
saved, they can survive a device reboot. You can bind a secure MAC address only to one port in a
VLAN.
When the maximum number of secure MAC address entries is reached, the port changes to secure mode.
In secure mode, the port cannot add or learn any more secure MAC addresses. The port allows only
frames sourced from secure MAC addresses or MAC addresses configured by using the mac-address
dynamic or mac-address static command to pass through.
Secure MAC addresses include static, sticky, and dynamic secure MAC addresses.
Command
system-view
interface interface-type
interface-number
port-security intrusion-mode
{ blockmac | disableport |
disableport-temporarily }
quit
port-security timer disableport
time-value
180
Remarks
N/A
N/A
By default, intrusion protection is
disabled.
N/A
By default, the port silence timeout
is 20 seconds.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents