Displaying 802.1X information. . . . . . . . . . . . . . . . . . . . . . . . . . . . .184 Displaying 802.1X configuration information . . . . . . . . . . . . .184 Displaying 802.1X statistics . . . . . . . . . . . . . . . . . . . . . . . . . . .187 Clearing 802.1X statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . .188 Displaying dynamically assigned VLAN information . . . . . . . .188 Displaying information about dynamically applied

MAC address filters and IP ACLs . . . . . . . . . . . . . . . . . . . . . . . .189 Displaying 802.1X multiple-host

authentication information . . . . . . . . . . . . . . . . . . . . . . . . . . . .191

Sample 802.1X configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . .196 Point-to-point configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . .196 Hub configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .197 802.1X authentication with dynamic VLAN assignment . . . . .198

Multi-device port authentication and 802.1X

security on the same port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199

Chapter 7

MAC Port Security

 

 

MAC port security overview

202

 

Local and global resources used for MAC port security

202

 

Configuration notes and feature limitations

 

 

for MAC port security

202

MAC port security configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . .203 Enabling the MAC port security feature . . . . . . . . . . . . . . . . . .203 Setting the maximum number of secure

MAC addresses for an interface . . . . . . . . . . . . . . . . . . . . . . . .204 Setting the port security age timer . . . . . . . . . . . . . . . . . . . . . .204 Specifying secure MAC addresses . . . . . . . . . . . . . . . . . . . . . .205 Autosaving secure MAC addresses to the

startup configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205 Specifying the action taken when a security

violation occurs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206

Clearing port security statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . .207 Clearing restricted MAC addresses. . . . . . . . . . . . . . . . . . . . . .207 Clearing violation statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . .207

Displaying port security information . . . . . . . . . . . . . . . . . . . . . . . .208 Displaying port security settings . . . . . . . . . . . . . . . . . . . . . . . .208 Displaying the secure MAC addresses . . . . . . . . . . . . . . . . . . .208 Displaying port security statistics . . . . . . . . . . . . . . . . . . . . . . .209 Displaying restricted MAC addresses on a port . . . . . . . . . . . .210

Chapter 8

MAC-based VLANs

 

 

MAC-based VLAN overview

211

 

Static and dynamic hosts

211

 

MAC-based VLAN feature structure

212

Brocade ICX 6650 Security Configuration Guide

ix

53-1002601-01

 

Page 9
Image 9
Brocade Communications Systems 6650 MAC port security overview, Local and global resources used for MAC port security