xxviii BigIron RX Series Configuration Guide
53-1002253-01
Example configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .940
Multi-device port authentication with dynamic
VLAN assignment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .941
Examples of multi-device port authentication and 802.1X
authentication configuration on the same port. . . . . . . . . . . .943
Chapter 32 Using the MAC Port Security Feature
and Transparent Port Flooding
MAC Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .947
Violation actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .947
Local and global resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .948
Configuring the MAC Port Security feature . . . . . . . . . . . . . . . . . . .948
Enabling the MAC Port Security feature . . . . . . . . . . . . . . . . . .948
Setting the maximum number of secure MAC addresses for
an interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .949
Specifying static secure MAC addresses . . . . . . . . . . . . . . . . .950
Enabling dynamic MAC address learning. . . . . . . . . . . . . . . . .950
Denying specific MAC addresses . . . . . . . . . . . . . . . . . . . . . . .950
Autosaving secure MAC addresses to the startup-config . . . .950
Setting the MAC Port Security age timer . . . . . . . . . . . . . . . . .951
Defining security violation actions . . . . . . . . . . . . . . . . . . . . . . . . . .951
Shutdown the interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .952
Restricting interface access . . . . . . . . . . . . . . . . . . . . . . . . . . .952
Denying a MAC address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .954
Understanding the rules for violation action configuration . . . . . .954
Interaction between global and interface level violation
actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .954
Changing the global violation action . . . . . . . . . . . . . . . . . . . .955
Changing the violation action for an interface. . . . . . . . . . . . .955
Re-enabling an interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .956
Interface shutdown time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .956
Manually re-enabling a interface . . . . . . . . . . . . . . . . . . . . . . .956
Displaying MAC Port Security information . . . . . . . . . . . . . . . . . . . .956
Displaying MAC Port Security settings . . . . . . . . . . . . . . . . . . .956
Displaying the secure MAC addresses list on the device . . . .957
Displaying MAC Port Security statistics . . . . . . . . . . . . . . . . . .958
Displaying a list of MAC addresses. . . . . . . . . . . . . . . . . . . . . .959
Displaying a list of secure and denied MAC addresses. . . . . .959
Displaying information when violation action is restrict . . . . .960
Displaying information when violation action is deny . . . . . . .960
Transparent port flooding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .961
Chapter 33 Configuring 802.1x Port Security
Overview of 802.1x port security . . . . . . . . . . . . . . . . . . . . . . . . . . .963
IETF RFC support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .963