Configuring Mac Limiting (J-Web Procedure); Example: Configuring Mac Limiting, Including Dynamic And Allowed Mac; Addresses, To Protect The Switch From Ethernet Switching Table Overflow - Juniper JUNOS OS 10.4 - FOR EX REV 1 Manual

For ex series ethernet switches
Table of Contents

Advertisement

Complete Software Guide for Junos
Related
Documentation
3140
®
OS for EX Series Ethernet Switches, Release 10.4
[edit ethernet-switching-options secure-access-port]
user@switch# set interface ge–0/0/1 mac-limit 5
On all interfaces:
[edit ethernet-switching-options secure-access-port]
user@switch# set interface all mac–limit 5
NOTE: Do not set the mac-limit to 1. The first learned MAC address is often
inserted into the forwarding database automatically (for instance, for
Routed VLAN Interfaces the first MAC address inserted into the forwarding
database is the MAC address of the RVI. For Aggregated Ethernet bundles
using LACP, the first MAC address inserted into the forwarding database
in the forwarding table is the source address of the protocol packet). The
switch will therefore not learn MAC addresses other than the automatic
addresses when the mac-limit is set to 1, and this will cause problems with
MAC learning and forwarding.
For specifying specific allowed MAC addresses:
2.
On a single interface (here, the interface is
[edit ethernet-switching-options secure-access-port]
user@switch# set interface ge–0/0/2 allowed-mac 00:05:85:3A:82:80
user@switch# set interface ge–0/0/2 allowed-mac 00:05:85:3A:82:81
user@switch# set interface ge–0/0/2 allowed-mac 00:05:85:3A:82:83
On all interfaces:
[edit ethernet-switching-options secure-access-port]
user@switch# set interface all allowed-mac 00:05:85:3A:82:80
user@switch# set interface all allowed-mac 00:05:85:3A:82:81
user@switch# set interface all allowed-mac 00:05:85:3A:82:83
Configuring MAC Limiting (J-Web Procedure) on page 3141
Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses,
to Protect the Switch from Ethernet Switching Table Overflow Attacks on page 3080
Verifying That MAC Limiting Is Working Correctly on page 3161
Setting the none Action on an Interface to Override a MAC Limit Applied to All Interfaces
(CLI Procedure) on page 3146
Configuring Autorecovery From the Disabled State on Secure or Storm Control Interfaces
(CLI Procedure) on page 3018
Understanding MAC Limiting and MAC Move Limiting for Port Security on EX Series
Switches on page 3062
no-allowed-mac-log on page 3191
):
ge-0/0/2
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junos os 10.4

Table of Contents