Figures; Tables - Avaya ERS 3500 Technical Configuration Manual

Mac address based security
Hide thumbs Also See for ERS 3500:
Table of Contents

Advertisement

avaya.com

Figures

Figure 1: Base setup ................................................................................................................................... 12
Figure 2: Regular MAC Security; example 1 ............................................................................................... 17
Figure 3: Example 1; unauthorized MAC on non-provisioned port ............................................................. 26
Figure 4: Example 1; unauthorized MAC on provisioned port .................................................................... 28
Figure 6: Example 1; unauthorized MAC moving to a different port ........................................................... 32
Figure 7: Regular MAC Security; example 2 ............................................................................................... 34
Figure 8: Example 2; a new device is added to the network ...................................................................... 43
Figure 9: MAC-Security with Active-Standby NICs; example 3 .................................................................. 49
Figure 10: Example 3; servers switch over to Backup NIC ......................................................................... 60
Figure 12: VLAN based MAC-Security; example 4 ..................................................................................... 63
Figure 13: Example 4; unauthorized MAC .................................................................................................. 70
Figure 14: Example 4; authorized MACs in wrong VLAN ........................................................................... 72
Figure 15: Auto-Learning with MaxMacs; example 5 .................................................................................. 74
Figure 19: Example 6; a new device is added to the network .................................................................... 97
Figure 20: Example 6; unauthorized MAC on provisioned port ................................................................ 101
Figure 22: Example 6; unauthorized MAC moving to a different port ....................................................... 106

Tables

Table 1: MAC Security support across Avaya switch family types ............................................................... 7
Table 2: MAC Security capability vs. mode matrix...................................................................................... 10
Table 3: MAC Security config commands vs. mode matrix ........................................................................ 11
Avaya Inc. - Internal Distribution
November 2010
5

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ers 2500Ers 4800Ers 4500Vsp 7000Ers 5600Ers 5500

Table of Contents