2.Use the following command to manually add the “permitted” MAC addresses to the Address Forwarding Table (AFT):

>(config)# set aft entry <mac address> vlan <vlan-id> port- binding forward <mod-port-spec>

3.Use the following command to disable learning on a port or port range:

>(config)# set port allow-learning <mod- swport-range> disable

4.Use the following command to enable known-mode on a port or port range:

>(config)# set port known-mode <mod-swport-range> enable

*Note: To prevent any flooding of frames from unknown source addresses, enter all ports on the same VLAN as the port for which you are enabling MAC address lock.

5.Use the following command to enable intrusion traps on a port or port range:

>(config)# set port intrusion-trap <mod-swport-range> enable

6.Use the following command to set the intrusion trap timer to other than the default setting:

>(config)# set port intrusion-trap-timer <mod-swport-range> <intrusion-trap-timer-value>

Enabling MAC Address Lock and Traps by Using SNMP

The MIB items that you use to perform this procedure are located in

ProminetMib.txt, version 5.2.

To use SNMP to enable the MAC Address Lock feature and traps for unknown source addresses:

1.Use the MIB items that are listed in Table 4 to manually add the “permitted” MAC addresses to the AFT.

610-0184-095

June 14, 2001

15

Page 15
Image 15
Avaya P580, P550R, P880 manual Enabling MAC Address Lock and Traps by Using Snmp, ProminetMib.txt, version