<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port MAC Security Question in ICX Switches</title>
    <link>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30553#M1646</link>
    <description>&lt;P style="margin: 0;"&gt;Excellent - thanks so much!&lt;/P&gt;</description>
    <pubDate>Wed, 23 Jun 2021 16:07:17 GMT</pubDate>
    <dc:creator>david_levine</dc:creator>
    <dc:date>2021-06-23T16:07:17Z</dc:date>
    <item>
      <title>Port MAC Security Question</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30546#M1639</link>
      <description>&lt;P style="margin: 0;"&gt;I am reading about "port MAC security" in the Fastiron Security Guide. We may choose to use this instead of full blown 802.1x auth on all ICX end-user access ports.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;It is not clear to me though - MACSec appears to be a separate licensed feature, And is only supported on 7450 and better devices. Does this apply to Port MAC Security as well? Or is this available on all ICX switches? (we have mostly 7150)&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Also, it looks like this is something that is either enabled or disabled on the switch... not something that is enabled or disabled per port? If this is the case, and I have a switch with APs connected to it... how would that work? If I say that there is a maximum number of 4 secure MAC addresses (local resources). If I have an AP connected to a port on that switch... the AP will have a few MAC addresses on its own, and then there are the MAC addresses of any clients that connect to wireless networks, etc.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;How would this be handled?&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Thanks,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 16:08:17 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30546#M1639</guid>
      <dc:creator>david_levine</dc:creator>
      <dc:date>2021-06-22T16:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: Port MAC Security Question</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30547#M1640</link>
      <description>&lt;P style="margin: 0;"&gt;Hey David,&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;They are two separate, independent features. Port Mac Security basically let's you set up a limit on the number of mac addresses allowed on a port along with actions if you exceed those specified limits. You will not need a license for this feature.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Macsec is basically point-to-point encryption on links and does indeed require a license.&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;I don't think you would use either of these on an AP port as you could be learning a very high amount of mac-addresses on the respective switchport due to wireless clients.&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Let me know if that makes sense and if you have any additional questions/concerns.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 16:16:03 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30547#M1640</guid>
      <dc:creator>BenBeck</dc:creator>
      <dc:date>2021-06-22T16:16:03Z</dc:date>
    </item>
    <item>
      <title>Re: Port MAC Security Question</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30548#M1641</link>
      <description>&lt;P style="margin: 0;"&gt;Hello David,&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;MACsec is a separate feature that encrypts point-to-point communication on a layer 2 basis.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;I think you're looking for mac-authentication that can be enabled per port on any of the ICX models and authenticates the end user's mac-address against an authenticating server as RADIUS.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Here you can find the guide:&lt;BR /&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-98B6424C-B7ED-4CA2-80B2-C35C713BB79E.html" target="_blank" rel="noopener noopener noreferrer"&gt;https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-98B6424C-B7ED-4CA2-80B2-C35C713BB79E.html&lt;/A&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;On the other hand, there is also port MAC security (PMS) feature, that allows you to configure the device to learn a limited number of secure MAC addresses on an interface. The interface forwards only those packets with source MAC addresses that match these secure addresses.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Here the guide:&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08092-securityguide/page/GUID-B9D5C5CA-0C1A-4D03-9D7B-CE21926AB6FB.html" target="_blank" rel="noopener noopener noreferrer"&gt;https://docs.commscope.com/bundle/fastiron-08092-securityguide/page/GUID-B9D5C5CA-0C1A-4D03-9D7B-CE21926AB6FB.html&lt;/A&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Please let me know if this information has been useful.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 16:16:43 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30548#M1641</guid>
      <dc:creator>Orlando_Elias</dc:creator>
      <dc:date>2021-06-22T16:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: Port MAC Security Question</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30549#M1642</link>
      <description>&lt;P style="margin: 0;"&gt;Thanks for the feedback; It is not clear to me though - is Port MAC Security something that can be enabled only on specific interfaces? The documentation indicates that it is enabled globally on the switch:&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Enter global configuration mode.&lt;BR /&gt;device# configure terminal&lt;BR /&gt;2. Enter port security configuration mode.&lt;BR /&gt;device(config)# port security&lt;BR /&gt;3. Enable port MAC security globally on the device.&lt;BR /&gt;device(config-port-security)# enable&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Is this the case? What if I have a switch and I only want to enable this on specific ports? (like, enable on all ports except where APs are connected)?&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 17:58:32 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30549#M1642</guid>
      <dc:creator>david_levine</dc:creator>
      <dc:date>2021-06-22T17:58:32Z</dc:date>
    </item>
    <item>
      <title>Re: Port MAC Security Question</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30550#M1643</link>
      <description>&lt;P style="margin: 0;"&gt;Hey David,&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;It is a bit confusing. If you enable it at the global level, it will turn the feature on for every port and use the global settings. However, you can also implement at the port level which is likely more useful. Here is an example:&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;SSH@ICX(config)#int e 1/3/1&lt;BR /&gt;SSH@ICX(config-if-e10000-1/3/1)#port security&lt;BR /&gt;SSH@ICX(config-port-security-if-e10000-1/3/1)#maximum 3&lt;BR /&gt;SSH@ICX(config-port-security-if-e10000-1/3/1)#violation shutdown&lt;BR /&gt;SSH@ICX(config-port-security-if-e10000-1/3/1)#enable&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Here is how it would look in the running config:&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;interface ethernet 1/3/1&lt;BR /&gt;&amp;nbsp;port security&lt;BR /&gt;&amp;nbsp; enable&lt;BR /&gt;&amp;nbsp; maximum 3&lt;BR /&gt;&amp;nbsp; violation shutdown&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Here is the 'show port security':&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;SSH@ICX#show port security&lt;BR /&gt;Port &amp;nbsp; &amp;nbsp;Security Violation Shutdown-Time Age-Time &amp;nbsp;Max-MAC&lt;BR /&gt;------- -------- --------- ------------- --------- -------&lt;BR /&gt;1/1/1 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/1/2 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/1/3 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/1/4 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/1/5 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/1/6 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/1/7 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/1/8 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/1/9 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/1/10 &amp;nbsp; disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/1/11 &amp;nbsp; disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/1/12 &amp;nbsp; disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/2/1 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/2/2 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;BR /&gt;1/3/1 &amp;nbsp; &amp;nbsp; enabled &amp;nbsp;shutdown &amp;nbsp; &amp;nbsp; permanent permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 3&lt;BR /&gt;1/3/2 &amp;nbsp; &amp;nbsp;disabled &amp;nbsp; protect &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permanent &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 18:24:32 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30550#M1643</guid>
      <dc:creator>BenBeck</dc:creator>
      <dc:date>2021-06-22T18:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: Port MAC Security Question</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30551#M1644</link>
      <description>&lt;P style="margin: 0;"&gt;Ok cool - so it can be configured per port.&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;If it is configured globally initially, can more specific settings then be configured explicitly on a port?&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;I ask since I think a basic setting with "protect" and 3 or 4 secure mac addresses would work for the majority of our access ports... but there will be some exceptions (where small desktop switches exist, printers, etc.)&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;If it can't be done with a global setting along with custom settings for specific ports, is there a way to do range programming? like, to enable it for all ethernet interfaces 1/1/1 to 1/1/48, 2/1/1 to 2/1/48 , etc.?&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Thanks,&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;D&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 15:54:18 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30551#M1644</guid>
      <dc:creator>david_levine</dc:creator>
      <dc:date>2021-06-23T15:54:18Z</dc:date>
    </item>
    <item>
      <title>Re: Port MAC Security Question</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30552#M1645</link>
      <description>&lt;P style="margin: 0;"&gt;Hey David,&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Yes, port-level settings supersede global settings so you can surely do that.&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Also, you can do port ranges to apply settings to multiple ports. Example:&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;SSH@ICX(config)#interface ethernet 1/1/1 to 1/1/12&lt;BR /&gt;SSH@ICX(config-mif-1/1/1-1/1/12)#port security&lt;BR /&gt;SSH@ICX(config-port-security-mif-1/1/1-1/1/12)#maximum 99&lt;BR /&gt;SSH@ICX(config-port-security-mif-1/1/1-1/1/12)#violation restrict&lt;BR /&gt;SSH@ICX(config-port-security-mif-1/1/1-1/1/12)#enable&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 15:59:52 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30552#M1645</guid>
      <dc:creator>BenBeck</dc:creator>
      <dc:date>2021-06-23T15:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: Port MAC Security Question</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30553#M1646</link>
      <description>&lt;P style="margin: 0;"&gt;Excellent - thanks so much!&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 16:07:17 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Port-MAC-Security-Question/m-p/30553#M1646</guid>
      <dc:creator>david_levine</dc:creator>
      <dc:date>2021-06-23T16:07:17Z</dc:date>
    </item>
  </channel>
</rss>

