Avaya Inc. – Internal Distribution
avaya.com
Table of Contents
Figures .......................................................................................................................................................... 5
Tables ............................................................................................................................................................ 5
1. Introduction ........................................................................................................................................... 7
2. Base configuration setup .................................................................................................................... 12
2.1 Ensuring MAC Security can never accidentally be enabled on uplinks ...................................... 13
2.2 Disabling SNMP write access just for MAC Security configuration ............................................ 15
3. Regular MAC Security examples ........................................................................................................ 17
3.1 Controlling exactly which MAC is allowed to use each and every access port .......................... 17
3.2 Ensuring that no new unauthorized device (MAC) is added to the network ............................... 34
3.3 Using MAC Security to tie down Server MACs using Active/Standby NICs ............................... 49
3.4 Achieving MAC based VLANs using MAC Security .................................................................... 63
4. Auto-Learning with MaxMacs example ............................................................................................... 74
4.1 Ensuring that every access port is used by one and only one device ........................................ 74
5. Auto-Learning with Sticky-MAC example............................................................................................ 86
5.1 MAC Security without having to pre-provision ports when new devices added ......................... 86