<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Mac Security in ICX Switches</title>
    <link>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76641#M5328</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hi Dejeh1,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you for reaching us&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;From the details shared I could understand that you are trying to use port security on a port where AP is connected. Could you please help us with below details.&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Could you please let us know if there is a specific requirement due to which you are trying to set port security on a AP port ?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;How many AP devices are connected to this switch ?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Do you have a number with regard to number of wireless clients who would connect to the AP on a daily basis or during high usage period , like max users?&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;There would be a need to understand the number of wireless clients who connect to the AP , this is because when we consider a Access point we do not know how many clients would connect to the AP.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you configure a max limit is 10 and if the max limit had already reached and latter a&amp;nbsp; new client "11th client" tries to connect he will be denied network access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So mostly we do not recommend port security on AP ports.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you are choosing to enable port security you can consider using them on wired clients which are on wired network and directly connected to the switch and mac address is always same and does not change.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can also run through the below two links which will give you a idea about resources and considerations for port mac security&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Local and Global Resources Used for Port MAC Security&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-B2804916-51FE-43DE-AE64-B80BEB6B386C.html" target="_blank"&gt;https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-B2804916-51FE-43DE-AE64-B80BEB6B386C.html&lt;/A&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Configuration Considerations for Port MAC Security&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-87F1BCB5-AE06-4548-BCE5-EEEFC170CC4D.html" target="_blank"&gt;https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-87F1BCB5-AE06-4548-BCE5-EEEFC170CC4D.html&lt;/A&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;I hope this helps&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 Mar 2024 13:36:32 GMT</pubDate>
    <dc:creator>Chandini</dc:creator>
    <dc:date>2024-03-07T13:36:32Z</dc:date>
    <item>
      <title>Mac Security</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76623#M5322</link>
      <description>&lt;P&gt;How do I configure switch port mac security on a switch connected to a Ruckus R550 Access Point without the switch learning the mac addresses of devices connected to the access point?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 17:18:35 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76623#M5322</guid>
      <dc:creator>Dejeh1</dc:creator>
      <dc:date>2024-03-06T17:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: Mac Security</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76634#M5323</link>
      <description>&lt;P&gt;&lt;a href="https://community.ruckuswireless.com/t5/user/viewprofilepage/user-id/18356"&gt;@Dejeh1&lt;/a&gt;&amp;nbsp;Please find the link below for configuring port mac security in ICX switches:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-379CDDC9-2F15-4F4B-8D86-63C74D560556.html" target="_blank"&gt;https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-379CDDC9-2F15-4F4B-8D86-63C74D560556.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Zairah Javeed&lt;BR /&gt;Sr Technical Support Engineer | L2 TAC Wired&lt;BR /&gt;support.ruckuswireless.com/contact-us&lt;/P&gt;&lt;P&gt;COMMSCOPE&lt;BR /&gt;now meets next&lt;/P&gt;&lt;P&gt;Note: Please feel free to mark the post as ACCEPTED SOLUTIONS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 03:24:09 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76634#M5323</guid>
      <dc:creator>Zairah</dc:creator>
      <dc:date>2024-03-07T03:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: Mac Security</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76635#M5324</link>
      <description>&lt;P&gt;Hi Dejeh1,&lt;/P&gt;&lt;P&gt;Thank you for posting you query !!!&lt;/P&gt;&lt;P&gt;I understand that you would like to configure switch port mac security on a switch connected to a Ruckus R550 Access Point without the switch learning the mac addresses of devices connected to the access point.&lt;/P&gt;&lt;P&gt;Please find the below steps for you refrence :&lt;/P&gt;&lt;P&gt;********************************&lt;BR /&gt;MAC port security configuration&lt;BR /&gt;********************************&lt;/P&gt;&lt;P&gt;To configure the MAC port security feature, perform the following tasks:&lt;/P&gt;&lt;P&gt;• Enable the MAC port security feature&lt;BR /&gt;• Set the maximum number of secure MAC addresses for an interface&lt;BR /&gt;• Set the port security age timer&lt;BR /&gt;• Specify secure MAC addresses&lt;BR /&gt;• Configure the device to automatically save secure MAC addresses to the startup-config file&lt;BR /&gt;• Specify the action taken when a security violation occurs&lt;/P&gt;&lt;P&gt;**************************************&lt;BR /&gt;Enabling the MAC port security feature&lt;BR /&gt;**************************************&lt;/P&gt;&lt;P&gt;By default, the MAC port security feature is disabled on all interfaces. You can enable or disable the feature on all interfaces at once, or on individual interfaces.&lt;/P&gt;&lt;P&gt;To enable the feature on all interfaces at once, enter the following commands:&lt;BR /&gt;device(config)# port security&lt;BR /&gt;device(config-port-security)# enable&lt;/P&gt;&lt;P&gt;To disable the feature on all interfaces at once, enter the following commands:&lt;BR /&gt;device(config)# port security&lt;BR /&gt;device(config-port-security)# no enable&lt;/P&gt;&lt;P&gt;To enable the feature on a specific interface, enter the following commands:&lt;BR /&gt;device(config)# interface ethernet 1/7/11&lt;BR /&gt;device(config-if-e1000-1/7/11)# port security&lt;BR /&gt;device(config-port-security-e1000-1/7/11)# enable&lt;/P&gt;&lt;P&gt;Syntax: port security&lt;BR /&gt;Syntax: no enable&lt;/P&gt;&lt;P&gt;********************************************************************&lt;BR /&gt;Setting the maximum number of secure MAC addresses for an interface&lt;BR /&gt;********************************************************************&lt;/P&gt;&lt;P&gt;When MAC port security is enabled, an interface can store one secure MAC address. You can increase the number of MAC addresses that can be stored to a maximum of 64, plus the total number of global resources available.&lt;/P&gt;&lt;P&gt;For example, to configure interface 1/7/11 to have a maximum of 10 secure MAC addresses, enter the following commands.&lt;BR /&gt;device(config)# interface ethernet 1/7/11&lt;BR /&gt;device(config-if-e1000-1/7/11)# port security&lt;BR /&gt;device(config-port-security-e1000-1/7/11)# maximum 10&lt;/P&gt;&lt;P&gt;Syntax: maximum number-of-addresses&lt;/P&gt;&lt;P&gt;The number-of-addresses parameter can be set to a number from 0 through 64 plus (the total number of global resources available). The total number of global resources is 2048 or 4096, depending on flash memory size. Setting the parameter to 0 prevents any addresses from being learned. The default is 1.&lt;/P&gt;&lt;P&gt;************************************&lt;BR /&gt;Setting the port security age timer&lt;BR /&gt;************************************&lt;/P&gt;&lt;P&gt;By default, learned MAC addresses stay secure indefinitely. You can optionally configure the device to age out secure MAC addresses after a specified amount of time.&lt;/P&gt;&lt;P&gt;To set the port security age timer to 10 minutes on all interfaces, enter the following commands:&lt;BR /&gt;device(config)# port security&lt;BR /&gt;device(config-port-security)# age 10&lt;/P&gt;&lt;P&gt;To age out all secure MAC-addresses immediately after two minutes, enter the following commands:&lt;BR /&gt;device(config)# port security&lt;BR /&gt;device(config-port-security)# age 2 absolute&lt;/P&gt;&lt;P&gt;To set the port security age timer to 10 minutes on a specific interface, enter the following commands:&lt;BR /&gt;device(config)# interface ethernet 7/1/1&lt;BR /&gt;device(config-if-e1000-7/1/1)# port security&lt;BR /&gt;device(config-port-security-e1000-7/1/1)# age 10&lt;/P&gt;&lt;P&gt;Syntax: [no] age minutes [ minutes | absolute ]&lt;/P&gt;&lt;P&gt;The minutes variable specifies a range from 0 through 1440 minutes. The default is 0 (never age out secure MAC addresses).&lt;/P&gt;&lt;P&gt;The optional absolute keyword sets all secure MAC addresses to age out immediately once the specified time expires. If the absolute keyword is not specified, secure MAC addresses are aged out only when the configured hardware MAC age time expires.&lt;BR /&gt;----------&lt;BR /&gt;Note: When using the absolute option to age out MAC addresses on timer expiry, make sure that the age timer value is sufficient. Avoid using a very short timer expiry with the absolute option, as the value may be in conflict with other timer settings and may cause performance problems in the network. For example, a one-minute timer expiry will cause MAC addresses to be flushed every minute. As a result, operational (enable/disable) loops and packet flooding may occur following a security violation, which by default causes a port to be disabled for one minute.&lt;BR /&gt;----------&lt;BR /&gt;Note: Even though you can set age time to specific ports independent of the device-level setting, the actual age timer will take the greater of the two values. Thus, if you set the age timer to 3 minutes for the port, and 10 minutes for the device, the port MAC aging happens in 10 minutes (the device-level setting), which is greater than the port setting that you have configured.&lt;BR /&gt;----------&lt;/P&gt;&lt;P&gt;On the Brocade ICX 7750, Brocade ICX 7450, and Brocade ICX 7250, the port security age can only be set to the global hardware age. The absolute age and no age secure MACs are configured as static in hardware. To set or unset PMS MAC age time to global-mac-timer (hardware age timer), enter the following commands:&lt;BR /&gt;device(config-port-security-e1000-1/7/11)# age global-mac&lt;BR /&gt;device(config-port-security-e1000-1/7/11)# no age global-mac&lt;/P&gt;&lt;P&gt;*********************************&lt;BR /&gt;Specifying secure MAC addresses&lt;BR /&gt;*********************************&lt;/P&gt;&lt;P&gt;You can configure secure MAC addresses on tagged and untagged interfaces. On an untagged interface to specify a secure MAC address on an untagged interface, enter commands such as the following:&lt;BR /&gt;device(config)# interface ethernet 1/7/11&lt;BR /&gt;device(config-if-e1000-1/7/11)# port security&lt;BR /&gt;device(config-port-security-e1000-1/7/11)# secure-mac-address 0000.0018.747C&lt;/P&gt;&lt;P&gt;Syntax: [no] secure-mac-address mac-address&lt;/P&gt;&lt;P&gt;On a tagged interface when specifying a secure MAC address on a tagged interface, you must also specify the VLAN ID. To do so, enter commands such as the following:&lt;BR /&gt;device(config)# interface ethernet 1/7/11&lt;BR /&gt;device(config-if-e1000-1/7/11)# port security&lt;BR /&gt;device(config-port-security-e1000-1/7/11)# secure-mac-address 0000.0018.747C 2&lt;/P&gt;&lt;P&gt;Syntax: [no] secure-mac-address mac-address [ vlan-ID ]&lt;BR /&gt;----------&lt;BR /&gt;Note: If MAC port security is enabled on a port and you change the VLAN membership of the port, make sure that you also change the VLAN ID specified in the secure-mac-address configuration statement for the port.&lt;BR /&gt;----------&lt;BR /&gt;When a secure MAC address is applied to a tagged port, the VLAN ID is generated for both tagged and untagged ports. When you display the configuration, you will see an entry for the secure MAC addresses. For example, you might see an entry similar to the following line.&lt;/P&gt;&lt;P&gt;secure-mac-address 0000.0011.2222 10 10&lt;/P&gt;&lt;P&gt;This line means that MAC address 0000.0011.2222 10 on VLAN 10 is a secure MAC address.&lt;/P&gt;&lt;P&gt;Autosaving secure MAC addresses to the startup configuration&lt;/P&gt;&lt;P&gt;Learned MAC addresses can automatically be saved to the startup configuration at specified intervals. The autosave feature saves learned MAC addresses by copying the running configuration to the startup configuration.&lt;/P&gt;&lt;P&gt;For example, to automatically save learned secure MAC addresses every 20 minutes, enter the following commands:&lt;BR /&gt;device(config)# port security&lt;BR /&gt;device(config-port-security)# autosave 20&lt;/P&gt;&lt;P&gt;Syntax: [no] autosave minutes ]&lt;/P&gt;&lt;P&gt;The minutes variable can be from 15 through 1440 minutes. By default, secure MAC addresses are not autosaved to the startup-config file. If you change the autosave interval, the next save happens according to the old interval, then the new interval takes effect. To change the interval immediately, disable autosave by entering the no autosave command, then configure the new autosave interval using the autosave command.&lt;BR /&gt;&lt;BR /&gt;*************************************************************&lt;BR /&gt;Specifying the action taken when a security violation occurs&lt;BR /&gt;*************************************************************&lt;/P&gt;&lt;P&gt;A security violation can occur when a user tries to connect to a port where a MAC address is already locked, or the maximum number of secure MAC addresses has been exceeded. When a security violation occurs, an SNMP trap and Syslog message are generated.&lt;/P&gt;&lt;P&gt;You can configure the device to take one of two actions when a security violation occurs; either drop packets from the violating address (and allow packets from secure addresses), or disable the port for a specified time.&lt;/P&gt;&lt;P&gt;Dropping packets from a violating address&lt;/P&gt;&lt;P&gt;To configure the device to drop packets from a violating address and allow packets from secure addresses, enter the following commands.&lt;BR /&gt;device(config)# interface ethernet 1/7/11&lt;BR /&gt;device(config-if-e1000-1/7/11)# port security&lt;BR /&gt;device(config-port-security-e1000-1/7/11)# violation restrict&lt;/P&gt;&lt;P&gt;Syntax: violation [ restrict ]&lt;BR /&gt;----------&lt;BR /&gt;Note: When the restrict option is used, the maximum number of MAC addresses that can be restricted is 128. If the number of violating MAC addresses exceeds this number, the port is shut down. An SNMP trap and the following Syslog message are generated: "Port Security violation restrict limit 128 exceeded on interface ethernet port_id ". This is followed by a port shutdown Syslog message and trap.&lt;BR /&gt;----------&lt;/P&gt;&lt;P&gt;**********************************************************************&lt;BR /&gt;Specifying the period of time to drop packets from a violating address&lt;BR /&gt;**********************************************************************&lt;/P&gt;&lt;P&gt;To specify the number of minutes that the device drops packets from a violating address, use&lt;BR /&gt;commands similar to the following:&lt;BR /&gt;device(config)# interface ethernet 1/7/11&lt;BR /&gt;device(config-if-e1000-1/7/11)# port security&lt;BR /&gt;device(config-port-security-e1000-1/7/11)# violation restrict 5&lt;/P&gt;&lt;P&gt;Syntax: violation [ restrict ] [age ]&lt;/P&gt;&lt;P&gt;The age variable can be from 0 through 1440 minutes. The default is 5 minutes. Specifying 0 drops packets from the violating address permanently.&lt;/P&gt;&lt;P&gt;Aging for restricted MAC addresses is done in software. There can be a worst case inaccuracy of one minute from the specified time.&lt;/P&gt;&lt;P&gt;The restricted MAC addresses are denied in hardware.&lt;/P&gt;&lt;P&gt;Disabling the port for a specified amount of time&lt;/P&gt;&lt;P&gt;You can configure the device to disable the port for a specified amount of time when a security violation occurs.&lt;/P&gt;&lt;P&gt;To shut down the port for 5 minutes when a security violation occurs, enter the following commands.&lt;BR /&gt;device(config)# interface ethernet 1/7/11&lt;BR /&gt;device(config-if-e1000-1/7/11)# port security&lt;BR /&gt;device(config-port-security-e1000-1/7/11)# violation shutdown 5&lt;/P&gt;&lt;P&gt;Syntax: violation [ shutdown ] [minutes ]&lt;/P&gt;&lt;P&gt;The minutes can be from 0 through 1440 minutes. Specifying 0 shuts down the port permanently when a security violation occurs.&lt;/P&gt;&lt;P&gt;You can also refer blow link for your refernce:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-379CDDC9-2F15-4F4B-8D86-63C74D560556.html" target="_blank"&gt;https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-379CDDC9-2F15-4F4B-8D86-63C74D560556.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I hope this information helps you&lt;/P&gt;&lt;P&gt;Please feel free to leave us a message if any concerns&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 05:44:41 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76635#M5324</guid>
      <dc:creator>Mayank</dc:creator>
      <dc:date>2024-03-07T05:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: Mac Security</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76641#M5328</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Dejeh1,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you for reaching us&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;From the details shared I could understand that you are trying to use port security on a port where AP is connected. Could you please help us with below details.&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Could you please let us know if there is a specific requirement due to which you are trying to set port security on a AP port ?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;How many AP devices are connected to this switch ?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Do you have a number with regard to number of wireless clients who would connect to the AP on a daily basis or during high usage period , like max users?&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;There would be a need to understand the number of wireless clients who connect to the AP , this is because when we consider a Access point we do not know how many clients would connect to the AP.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you configure a max limit is 10 and if the max limit had already reached and latter a&amp;nbsp; new client "11th client" tries to connect he will be denied network access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So mostly we do not recommend port security on AP ports.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you are choosing to enable port security you can consider using them on wired clients which are on wired network and directly connected to the switch and mac address is always same and does not change.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can also run through the below two links which will give you a idea about resources and considerations for port mac security&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Local and Global Resources Used for Port MAC Security&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-B2804916-51FE-43DE-AE64-B80BEB6B386C.html" target="_blank"&gt;https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-B2804916-51FE-43DE-AE64-B80BEB6B386C.html&lt;/A&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Configuration Considerations for Port MAC Security&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-87F1BCB5-AE06-4548-BCE5-EEEFC170CC4D.html" target="_blank"&gt;https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-87F1BCB5-AE06-4548-BCE5-EEEFC170CC4D.html&lt;/A&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;I hope this helps&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 13:36:32 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76641#M5328</guid>
      <dc:creator>Chandini</dc:creator>
      <dc:date>2024-03-07T13:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: Mac Security</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76676#M5330</link>
      <description>&lt;P&gt;Thanks, everyone for the contributions, I really appreciate it.&lt;/P&gt;&lt;P&gt;Since the network is set up for users to use DPSK to connect to the Access points connected to the switch a maximum of 10 Mac won't be okay to prevent the port from shutting down. What I'm trying to achieve is a situation where only the First Access point connected to that switch port Mac address will be learned by the switch, if another Access point is connected to that same switch port it will block. But so far, the switch port learns both the Access point Mac address and every user connected to the Access point Mac address and we don't want this.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 20:36:59 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76676#M5330</guid>
      <dc:creator>Dejeh1</dc:creator>
      <dc:date>2024-03-07T20:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: Mac Security</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76712#M5332</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Dejeh1,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you for reaching us&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;"&lt;SPAN&gt;What I'm trying to achieve is a situation where only the First Access point connected to that switch port Mac address will be learned by the switch, if another Access point is connected to that same switch port it will block. But so far, the switch port learns both the Access point Mac address and every user connected to the Access point Mac address and we don't want this.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;"&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Based on the above statement below is what I could understand&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;1st AP mac address should be learnt&lt;/LI&gt;&lt;LI&gt;2nd AP mac address should not be learnt and should be blocked&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;But switch learns both AP mac address and all user mac details connected to both AP's.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I suppose the above would be difficult to achieve below is the reason why&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;For the AP to operated and communicate with the network the mac address of the AP device or any device which is connected to the switch would be learnt , so if AP is connected on a port of the switch, it will learn the AP mac address. So I suppose when compared to your scenario since there are two AP then both AP mac address is learnt on the switch , we can understand here its working as designed.&lt;/LI&gt;&lt;LI&gt;When a user is connected on Wifi the user connection would move from one AP to another automatically based on the user movement, so mac address would also be learnt on the AP in the same way. It would be difficult to understand between which AP user is roaming and how he is connecting.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;If you what only one AP to be used per switch , you can connect only one AP and remaining free ports you can choose to disable so that when a user connects another AP he would have no access to the network. And on ports where you have a wired connection to PC or other device which is not a AP device you can configure secure-mac-address max 1 per port.&lt;/P&gt;&lt;P&gt;I hope this helps&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 16:47:08 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/76712#M5332</guid>
      <dc:creator>Chandini</dc:creator>
      <dc:date>2024-03-08T16:47:08Z</dc:date>
    </item>
    <item>
      <title>Re: Mac Security</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/77109#M5362</link>
      <description>&lt;P&gt;Hi Dejeh1,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adding on to the details shared, based on the requirements, where :&lt;BR /&gt;&amp;gt; if the operation is that on a port only the connected [ specific ] AP should work&lt;BR /&gt;&amp;gt; any other device or AP should be blocked on that given port.&lt;BR /&gt;&amp;gt; clients connected to the permitted AP should pass through with no second authentication or security check on the switch.&lt;BR /&gt;&lt;BR /&gt;Then you could go for mac-auth for the APs on the said ports where APs are/would be connected.&amp;nbsp;&lt;BR /&gt;where only the permitted APs will be allowed to connect across. any other device on that port wont be allowed, and with single-host mode only AP will be authenticated, rest of the clients comming off the AP will be able to go through with no issues.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Link for further reading on the single-host auth mode :&amp;nbsp;&lt;BR /&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-55419E4A-017B-42A1-9BC0-F30E5C13280D.html" target="_blank" rel="noopener"&gt;https://docs.commscope.com/bundle/fastiron-08095-securityguide/page/GUID-55419E4A-017B-42A1-9BC0-F30E5C13280D.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;and the same can be scalled, to be applied to the rest of the ports as well if necessary or selected ports only and have the rest configured as needed.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Here however the MAC learn will still happen for all device(s) communicating via that port, howver the communication will only work given the AP connected is allowed via the auth.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Let us know your thoughts on the matter.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 16:04:45 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Mac-Security/m-p/77109#M5362</guid>
      <dc:creator>jdryan</dc:creator>
      <dc:date>2024-03-18T16:04:45Z</dc:date>
    </item>
  </channel>
</rss>

