
C
HAPTER
25
| General Security Measures
Network Access (MAC Address Authentication)
– 664 –
mac-authentication
intrusion-action
Use this command to configure the port response to a host MAC
authentication failure. Use the
no
form of this command to restore the
default.
S
YNTAX
mac-authentication intrusion-action
{
block traffic
|
pass traffic
}
no mac-authentication intrusion-action
D
EFAULT
S
ETTING
Block Traffic
C
OMMAND
M
ODE
Interface Con figuration
E
XAMPLE
Console(config-if)#mac-authentication intrusion-action block-traffic
Console(config-if)#
mac-authentication
max-mac-count
Use this command to set the maximum number of MAC addresses that can
be authenticated on a port via MAC authentication. Use the
no
form of this
command to restore the default.
S
YNTAX
mac-authentication max-mac-count
count
no mac-authentication max-mac-count
count -
The maximum number of MAC-authenticated MAC
addresses allowed. (Range: 1-1024)
D
EFAULT
S
ETTING
1024
C
OMMAND
M
ODE
Interface Configuration
E
XAMPLE
Console(config-if)#mac-authentication max-mac-count 32
Console(config-if)#
Summary of Contents for ES3510MA-DC
Page 1: ...Management Guide www edge core com 8 Port Layer 2 Fast Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 44: ...FIGURES 44...
Page 50: ...TABLES 50...
Page 52: ...SECTION I Getting Started 52...
Page 62: ...CHAPTER 1 Introduction System Defaults 62...
Page 80: ...CHAPTER 2 Initial Switch Configuration Managing System Files 80...
Page 82: ...SECTION II Web Configuration 82...
Page 98: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 98...
Page 126: ...CHAPTER 4 Basic Management Tasks Resetting the System 126...
Page 164: ...CHAPTER 5 Interface Configuration VLAN Trunking 164 Figure 57 Configuring VLAN Trunking...
Page 202: ...CHAPTER 7 Address Table Settings Configuring MAC Address Mirroring 202...
Page 452: ...CHAPTER 17 IP Services Displaying the DNS Cache 452...
Page 498: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 498...
Page 588: ...CHAPTER 22 SNMP Commands 588...
Page 596: ...CHAPTER 23 Remote Monitoring Commands 596...
Page 650: ...CHAPTER 24 Authentication Commands Management IP Filter 650...
Page 738: ...CHAPTER 27 Interface Commands 738...
Page 760: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 760...
Page 782: ...CHAPTER 32 Address Table Commands 782...
Page 810: ...CHAPTER 33 Spanning Tree Commands 810...
Page 862: ...CHAPTER 35 VLAN Commands Configuring Voice VLANs 862...
Page 876: ...CHAPTER 36 Class of Service Commands Priority Commands Layer 3 and 4 876...
Page 932: ...CHAPTER 38 Multicast Filtering Commands Multicast VLAN Registration 932...
Page 956: ...CHAPTER 39 LLDP Commands 956...
Page 1020: ...CHAPTER 42 Domain Name Service Commands 1020...
Page 1026: ...CHAPTER 43 DHCP Commands DHCP Client 1026...
Page 1058: ...CHAPTER 44 IP Interface Commands IPv6 Interface 1058...
Page 1060: ...SECTION IV Appendices 1060...
Page 1066: ...APPENDIX A Software Specifications Management Information Bases 1066...
Page 1088: ...COMMAND LIST 1088...
Page 1097: ......