EasyManua.ls Logo

Avaya ERS 3500 - 5.1.5 Testing Sticky-MAC Violations

Avaya ERS 3500
108 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Avaya Inc. Internal Distribution
avaya.com
November 2010
5.1.5 Testing violations
5.1.5.1 Unauthorized MAC on provisioned port
Figure 20: Example 6; unauthorized MAC on provisioned port
The unauthorized device is not able to send any traffic into the network; however it is still able to see
broadcast and unknown traffic flowing in the VLAN; if this is undesired the MAC Security should be
configured to partition the port upon an access violation.
Verify log file on switch
Avaya-ERS-Switch# show log
Type Time Idx Src Message
---- ----------------------------- ---- --- -------
I 16:02:19:46 1 Link Down Trap for Port: 1
I 16:02:19:51 2 Link Up Trap for Port: 1
I 16:02:19:55 3 Bay Secure: Exceeded 1 per-port MAC
addresses on port 0/1
I 16:02:19:55 4 Bay Secure intruder MAC 00-e0-4c-77-67-01
port 1
I 16:02:19:55 5 Trap: s5EtrNewSbsMacAccessViolation

Table of Contents

Other manuals for Avaya ERS 3500

Related product manuals