Avaya Inc. – Internal Distribution
avaya.com
Figures
Figure 1: Base setup ................................................................................................................................... 12
Figure 2: Regular MAC Security; example 1 ............................................................................................... 17
Figure 3: Example 1; unauthorized MAC on non-provisioned port ............................................................. 26
Figure 4: Example 1; unauthorized MAC on provisioned port .................................................................... 28
Figure 5: Example 1; unauthorized MAC sharing connection with authorized MAC .................................. 30
Figure 6: Example 1; unauthorized MAC moving to a different port ........................................................... 32
Figure 7: Regular MAC Security; example 2 ............................................................................................... 34
Figure 8: Example 2; a new device is added to the network ...................................................................... 43
Figure 9: MAC-Security with Active-Standby NICs; example 3 .................................................................. 49
Figure 10: Example 3; servers switch over to Backup NIC ......................................................................... 60
Figure 11: Example 3; unauthorized device takes server Standby NIC connection ................................... 61
Figure 12: VLAN based MAC-Security; example 4 ..................................................................................... 63
Figure 13: Example 4; unauthorized MAC .................................................................................................. 70
Figure 14: Example 4; authorized MACs in wrong VLAN ........................................................................... 72
Figure 15: Auto-Learning with MaxMacs; example 5 .................................................................................. 74
Figure 16: Example 5; an unauthorized hub/switch is connected to the network ....................................... 83
Figure 17: Example 5; an unauthorized WLAN AP is connected to the network........................................ 84
Figure 18: MAC Security without any provisioning of new devices; example 6 .......................................... 86
Figure 19: Example 6; a new device is added to the network .................................................................... 97
Figure 20: Example 6; unauthorized MAC on provisioned port ................................................................ 101
Figure 21: Example 6; unauthorized MAC sharing connection with authorized MAC .............................. 103
Figure 22: Example 6; unauthorized MAC moving to a different port ....................................................... 106
Tables
Table 1: MAC Security support across Avaya switch family types ............................................................... 7
Table 2: MAC Security capability vs. mode matrix...................................................................................... 10
Table 3: MAC Security config commands vs. mode matrix ........................................................................ 11