EasyManua.ls Logo

Avaya ERS 3500 - User Manual

Avaya ERS 3500
108 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
Ethernet Routing Switch
ERS 2500
ERS 3500
ERS 4500/ 4800
ERS 5500/ 5600
Virtual Services Platform
VSP 7000
Engineering
> MAC Address Based Security
Technical Configuration Guide
Avaya Data Solutions
Document Date: July 2012
Document Number: NN48500-601
Document Version: 2.1

Table of Contents

Other manuals for Avaya ERS 3500

Question and Answer IconNeed help?

Do you have a question about the Avaya ERS 3500 and is the answer not in the manual?

Avaya ERS 3500 Specifications

General IconGeneral
ModelERS 3500
Product TypeNetwork Router
Form FactorRack-Mountable
Ports24 or 48
Port Speed10/100/1000 Mbps
Switching Capacity128 Gbps
Forwarding Rate95.2 Mpps
VLANs Supported4094
Jumbo Frame SupportYes
LayerLayer 2/3
Uplink Ports4 x SFP
Power over Ethernet (PoE)Available on some models
MAC Address Table Size16, 000 entries
ManagementWeb-based, CLI, SNMP
FeaturesQoS
Operating Temperature0 to 50 °C
Storage Temperature-40 to 70 °C
Relative Humidity10% to 90% non-condensing

Summary

1. Introduction

MAC Security Feature Overview and Availability

Overview of MAC Security features and their availability across different Avaya switch families.

Understanding Regular MAC Security

Explains MAC Security where allowed MAC addresses are configured for ports or security lists.

2. Base configuration setup

Securing Uplinks and Limiting SNMP Access

Configures uplink port security and disables SNMP write access for MAC Security.

3. Regular MAC Security examples

3.1 Static MAC Assignment Per Port

Demonstrates manually configuring one MAC per port for strict access control.

3.1.4 Testing Regular MAC Security Violations

Illustrates various violation scenarios for Regular MAC Security.

4. Auto-Learning with MaxMacs example

4.1 Enforcing Single Device Per Port

Configures MAC Security to allow only one device per port to prevent unauthorized connections.

4.1.4 Testing MaxMacs Violations

Demonstrates violation scenarios when unauthorized devices connect.

5. Auto-Learning with Sticky-MAC example

5.1 Automatic MAC Learning and Port Binding

Describes MAC Security that automatically learns and sticks MAC addresses to ports without manual provisioning.

5.1.5 Testing Sticky-MAC Violations

Shows violation scenarios for Sticky-MAC mode.

Related product manuals