EasyManua.ls Logo

Avaya ERS 3500 - Figures; Tables

Avaya ERS 3500
108 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Avaya Inc. Internal Distribution
5
avaya.com
November 2010
Figures
Figure 1: Base setup ................................................................................................................................... 12
Figure 2: Regular MAC Security; example 1 ............................................................................................... 17
Figure 3: Example 1; unauthorized MAC on non-provisioned port ............................................................. 26
Figure 4: Example 1; unauthorized MAC on provisioned port .................................................................... 28
Figure 5: Example 1; unauthorized MAC sharing connection with authorized MAC .................................. 30
Figure 6: Example 1; unauthorized MAC moving to a different port ........................................................... 32
Figure 7: Regular MAC Security; example 2 ............................................................................................... 34
Figure 8: Example 2; a new device is added to the network ...................................................................... 43
Figure 9: MAC-Security with Active-Standby NICs; example 3 .................................................................. 49
Figure 10: Example 3; servers switch over to Backup NIC ......................................................................... 60
Figure 11: Example 3; unauthorized device takes server Standby NIC connection ................................... 61
Figure 12: VLAN based MAC-Security; example 4 ..................................................................................... 63
Figure 13: Example 4; unauthorized MAC .................................................................................................. 70
Figure 14: Example 4; authorized MACs in wrong VLAN ........................................................................... 72
Figure 15: Auto-Learning with MaxMacs; example 5 .................................................................................. 74
Figure 16: Example 5; an unauthorized hub/switch is connected to the network ....................................... 83
Figure 17: Example 5; an unauthorized WLAN AP is connected to the network........................................ 84
Figure 18: MAC Security without any provisioning of new devices; example 6 .......................................... 86
Figure 19: Example 6; a new device is added to the network .................................................................... 97
Figure 20: Example 6; unauthorized MAC on provisioned port ................................................................ 101
Figure 21: Example 6; unauthorized MAC sharing connection with authorized MAC .............................. 103
Figure 22: Example 6; unauthorized MAC moving to a different port ....................................................... 106
Tables
Table 1: MAC Security support across Avaya switch family types ............................................................... 7
Table 2: MAC Security capability vs. mode matrix...................................................................................... 10
Table 3: MAC Security config commands vs. mode matrix ........................................................................ 11

Table of Contents

Other manuals for Avaya ERS 3500

Related product manuals