Security
ExtremeWare XOS 11.3 Concepts Guide
316
NOTE
Blackhole FDB entries added due to MAC security violations on the BlackDiamond 8800 family of switches (formerly
known as Aspen) and the Summit X450 switch are removed after each FDB aging period regardless of whether the
MAC addresses in question are still sending traffic. If the MAC addresses are still sending traffic, the blackhole
entries will be re-added after they have been deleted.
Configuring Limit Learning
To limit the number of dynamic MAC addresses that can participate in the network, use the
limit-
learning
option in following command:
configure ports <portlist> vlan <vlan name> [limit-learning <number> | lock-learning |
unlimited-learning | unlock-learning]
This command specifies the number of dynamically-learned MAC entries allowed for these ports in this
VLAN. The range is 0 to 500,000 addresses.
When the learned limit is reached, all new source MAC addresses are blackholed at the ingress and
egress points. This prevents these MAC addresses from learning and responding to ICMP and ARP
packets.
Dynamically learned entries still get aged and can be cleared. If entries are cleared or aged out after the
learning limit has been reached, new entries will then be able to be learned until the limit is reached
again.
Permanent static and permanent dynamic entries can still be added and deleted using the
create
fdbentry
and
disable flooding port
commands. These override any dynamically learned entries.
For ports that have a learning limit in place, the following traffic still flows to the port:
●
Packets destined for permanent MAC addresses and other non-blackholed MAC addresses
●
Broadcast traffic
●
EDP traffic
Traffic from the permanent MAC and any other non-blackholed MAC addresses still flows from the
virtual port.
To remove the learning limit, use the
unlimited-learning
option from the following command:
configure ports <portlist> vlan <vlan name> [limit-learning <number> | lock-learning |
unlimited-learning | unlock-learning]
Displaying Limit Learning Information
To verify the configuration, use the following commands:
show vlan <vlan name> security
This command displays the MAC security information for the specified VLAN.
show ports {mgmt | <portlist>} info {detail}
Summary of Contents for ExtremeWare XOS 11.3
Page 20: ...Contents ExtremeWare XOS 11 3 Concepts Guide 20...
Page 25: ...1 Using ExtremeWare XOS...
Page 26: ......
Page 38: ...ExtremeWare XOS Overview ExtremeWare XOS 11 3 Concepts Guide 38...
Page 58: ...Accessing the Switch ExtremeWare XOS 11 3 Concepts Guide 58...
Page 146: ...Configuring Slots and Ports on a Switch ExtremeWare XOS 11 3 Concepts Guide 146...
Page 218: ...Status Monitoring and Statistics ExtremeWare XOS 11 3 Concepts Guide 218...
Page 240: ...Virtual LANs ExtremeWare XOS 11 3 Concepts Guide 240...
Page 248: ...Virtual Routers ExtremeWare XOS 11 3 Concepts Guide 248...
Page 278: ...Access Lists ACLs ExtremeWare XOS 11 3 Concepts Guide 278...
Page 288: ...Routing Policies ExtremeWare XOS 11 3 Concepts Guide 288 entry deny_rest if then deny...
Page 344: ...Security ExtremeWare XOS 11 3 Concepts Guide 344...
Page 393: ...2 Using Switching and Routing Protocols...
Page 394: ......
Page 454: ...Spanning Tree Protocol ExtremeWare XOS 11 3 Concepts Guide 454...
Page 484: ...Extreme Standby Router Protocol ExtremeWare XOS 11 3 Concepts Guide 484...
Page 514: ...IPv4 Unicast Routing ExtremeWare XOS 11 3 Concepts Guide 514...
Page 530: ...IPv6 Unicast Routing ExtremeWare XOS 11 3 Concepts Guide 530...
Page 538: ...RIP ExtremeWare XOS 11 3 Concepts Guide 538...
Page 556: ...OSPF ExtremeWare XOS 11 3 Concepts Guide 556...
Page 566: ...OSPFv3 ExtremeWare XOS 11 3 Concepts Guide 566...
Page 589: ...3 Appendixes...
Page 590: ......
Page 640: ...CNA Agent ExtremeWare XOS 11 3 Concepts Guide 640...
Page 670: ...Glossary ExtremeWare XOS 11 3 Concepts Guide 670...
Page 698: ...Index ExtremeWare XOS 11 3 Concepts Guide 698...