Authorization Scenario
Assume that the port security feature is activated and the following conditions are specified in the active
database:
•
A pWWN (P1) is allowed access through interface fc2/1 (F1).
•
A pWWN (P2) is allowed access through interface fc2/2 (F1).
•
A nWWN (N1) is allowed access through interface fc2/2 (F2).
•
Any WWN is allowed access through interface vfc3/1 (F3).
•
A nWWN (N3) is allowed access through any interface.
•
A pWWN (P3) is allowed access through interface fc2/4 (F4).
•
A sWWN (S1) is allowed access through interface fc3/1-3 (F10 to F13).
•
A pWWN (P10) is allowed access through interface vfc4/1 (F11).
The following table summarizes the port security authorization results for this active database.
Table 35: Authorization Results for Scenario
Reason
Condition
Authorization
Device Connection
Request
No conflict.
1
Permitted
P1, N2, F1
No conflict.
1
Permitted
P2, N2, F1
F1 is bound to P1/P2.
2
Denied
P3, N2, F1
Wildcard match for N3.
6
Permitted
P1, N3, F1
Wildcard match for F3.
5
Permitted
P1, N1, F3
P1 is bound to F1.
2
Denied
P1, N4, F5
N1 is only allowed on F2.
2
Denied
P5, N1, F5
No conflict.
1
Permitted
P3, N3, F4
No conflict.
1
Permitted
S1, F10
P10 is bound to F11.
7
Denied
S2, F11
No conflict.
3
Permitted
P4, N4, F5 (auto-learning
on)
No match.
4
Denied
P4, N4, F5 (auto-learning
off)
Cisco Nexus 5500 Series NX-OS SAN Switching Configuration Guide, Release 7.x
254
OL-30895-01
Configuring Port Security
Auto-Learning