19-10
Cisco ME 3800X and 3600X Switch Software Configuration Guide
OL-23400-01
Chapter 19 Configuring Traffic Control
Configuring EVC MAC Security
Step 6
encapsulation {default | dot1q |
priority-tagged | untagged}
Configure encapsulation type for the service instance.
•
default—Configure to match all unmatched packets.
•
dot1q—Configure 802.1Q encapsulation.
•
priority-tagged—Specify priority-tagged frames, VLAN-ID 0 and CoS
value of 0 to 7.
•
untagged—Map to untagged VLANs. Only one EFP per port can have
untagged encapsulation.
Note
You must configure encapsulation before you can configure a bridge
domain. You must configure a bridge domain to be able to configure
some MAC security commands.
Step 7
bridge-domain bridge-id
[split-horizon group group-id]
Configure the bridge domain ID. The range is from 1 to 8000.
•
(Optional) split-horizon group group-id—Configure a split-horizon
group. The group ID is from 1 to 3. EFPs in the same bridge domain and
split-horizon group cannot forward traffic between each other, but can
forward traffic between other EFPs in the same bridge domain but not in
the same split-horizon group.
Note
You must configure a bridge domain to see the mac security aging
static command or to configure a MAC security maximum address
value of more than one.
Step 8
mac security
Enable MAC security on the EFP.
Step 9
mac security address {permit |
deny} mac-address
(Optional) Configure the specified MAC address to be permitted or denied on
the service instance.
Step 10
mac security maximum addresses
value
(Optional) Set the maximum number of secure MAC addresses allowed on the
service instance. The range is 1 to 1000. Entering a value of 0 disables
dynamic MAC address learning. The maximum number of secure MAC
addresses on an EFP is 1000.The maximums number on a bridge domain or
on a switch depends on the feature license.
Step 11
mac security violation {protect |
restrict}
(Optional) Set the violation response on the service instance. If no response
is configured the default response is to errdisable (shut down) the service
instance when a MAC security violation occurs.
•
protect—When the number of port secure MAC addresses reaches the
maximum limit allowed on the port, packets with unknown source
addresses are dropped until you remove a sufficient number of secure
MAC addresses to drop below the maximum value or increase the number
of maximum allowable addresses. You are not notified that a security
violation has occurred.
•
restrict—When the number of secure MAC addresses reaches the limit
allowed on the port, packets with unknown source addresses are dropped
until you remove a sufficient number of secure MAC addresses or
increase the number of maximum allowable addresses. An SNMP trap is
sent, a syslog message is logged, and the violation counter increments.
Command
Purpose