
BigIron RX Series Configuration Guide
955
53-1002253-01
Understanding the rules for violation action configuration
32
•
If shutdown or restrict is the violation action configured at the global level and no violation
action is configured in the interface level, then the interface inherits the secure MAC list
configured at the global level.
•
If deny is the violation action at the global level and no violation action is configured at the
interface level, then the interface inherits the global deny MAC list.
•
If no violation action is configured on an interface, then the interface inherits the violation
action configured at the global level.
Changing the global violation action
If the global violation action changes from shutdown or restrict to deny, then the following occur:
•
All interfaces that inherit the global violation action inherit the new global violation action.
•
All MAC address entries are cleared on all interfaces that inherit the new global violation
action.
•
Interfaces that are configured with shutdown or restrict violation action will continue to use
their configured violation action; however, any secure MAC addresses inherited from the global
secure MAC address list will no longer be secure,but the secure MAC addresses at the
interface level will remain secure.
•
Interfaces on which deny is the configured violation action inherit any new secure MAC
addresses configured at the global level.
If the global violation action changes from deny to shutdown or restrict, the following occur:
•
All interfaces that inherit the global violation action inherit the new global violation action.
•
All MAC address entries are cleared on all interfaces that inherit the new global violation
action.
•
Interfaces that are configured with shutdown or restrict violation action inherit any new deny
MAC addresses configured at the global level.
•
Interfaces that are configured with deny violation action will continue to use the deny violation
action; however, all entries in the MAC table are cleared and any MAC entries in the deny MAC
address list that were inherited from the global deny MAC address list will no longer be denied.
The interface will continue to use the deny MAC addresses configured in its own deny MAC
address list.
Changing the violation action for an interface
The following events occur when the violation action for an interface is changed:
•
If the violation action for an interface is different from the global violation action, then the MAC
entries for the interface are cleared.
•
If the violation action for an interface is either shutdown or restrict but the action for the global
level is deny, then the interface inherits the global deny MAC address list. The entries in the
global deny MAC addreslist are added to the interface’s deny MAC address list. Similar event
occurs if the violation action for an interface is deny but the action at the global level is
shutdown or restrict.
•
When the violation action for an interface is being configured, the violation action of that
interface is updated to the new configured action, irrespective of its current value. Changing
the violation action for an interface clears the MAC addresses entries for that interface.
Summary of Contents for BigIron RX Series
Page 228: ...152 BigIron RX Series Configuration Guide 53 1002253 01 Enabling WAN PHY mode support 6 ...
Page 312: ...236 BigIron RX Series Configuration Guide 53 1002253 01 Displaying IP information 7 ...
Page 356: ...280 BigIron RX Series Configuration Guide 53 1002253 01 Resetting LLDP statistics 9 ...
Page 402: ...326 BigIron RX Series Configuration Guide 53 1002253 01 Transparent firewall mode 11 ...
Page 432: ...356 BigIron RX Series Configuration Guide 53 1002253 01 SuperSpan 12 ...
Page 500: ...424 BigIron RX Series Configuration Guide 53 1002253 01 MRP CLI example 14 ...
Page 591: ...BigIron RX Series Configuration Guide 515 53 1002253 01 Displaying traffic reduction 19 ...
Page 592: ...516 BigIron RX Series Configuration Guide 53 1002253 01 Displaying traffic reduction 19 ...
Page 598: ...522 BigIron RX Series Configuration Guide 53 1002253 01 Viewing Layer 2 ACLs 20 ...
Page 656: ...580 BigIron RX Series Configuration Guide 53 1002253 01 Trunk formation 22 ...
Page 754: ...678 BigIron RX Series Configuration Guide 53 1002253 01 Displaying RIP filters 24 ...
Page 814: ...738 BigIron RX Series Configuration Guide 53 1002253 01 Displaying OSPF information 25 ...
Page 980: ...904 BigIron RX Series Configuration Guide 53 1002253 01 Clearing IS IS information 28 ...
Page 1000: ...924 BigIron RX Series Configuration Guide 53 1002253 01 Using secure copy 30 ...
Page 1088: ...1012 BigIron RX Series Configuration Guide 53 1002253 01 IP source guard 35 ...
Page 1108: ...1032 BigIron RX Series Configuration Guide 53 1002253 01 Reading CDP packets 37 ...
Page 1126: ...1050 BigIron RX Series Configuration Guide 53 1002253 01 Clearing sFlow statistics 39 ...
Page 1324: ...1248 BigIron RX Series Configuration Guide 53 1002253 01 Displaying OSPFv3 information 48 ...
Page 1363: ...BigIron RX Series Configuration Guide 1287 53 1002253 01 Continuous System Monitor 51 ...
Page 1364: ...1288 BigIron RX Series Configuration Guide 53 1002253 01 Continuous System Monitor 51 ...
Page 1404: ...1328 BigIron RX Series Configuration Guide 53 1002253 01 Commands That Require a Reload D ...
Page 1458: ...1382 BigIron RX Series Configuration Guide 53 1002253 01 VSRP E ...