Comments on: Ethernet Routing Switch MAC Address Security https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/ technology, networking, virtualization and IP telephony Sat, 30 Oct 2021 18:02:18 +0000 hourly 1 https://wordpress.org/?v=6.7.2 By: syed https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-84465 Wed, 08 Nov 2017 10:50:34 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-84465 Hi Michael ,

“The number 448 if it is the maximum size no matter how many units in one stack ?”

]]>
By: karky https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-6116 Thu, 16 Feb 2012 21:13:25 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-6116 In reply to karky.

Just for confirmation : mac-security is buggy with ers4700 firmware 3.7x (i found other peoples who have tested it and had the same bug…)

]]>
By: karky https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-6100 Wed, 15 Feb 2012 19:41:48 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-6100 it’s like the last part of your topic “Here are some commands to enable continual MAC address learning and restrict the number of MAC addresses to 2”.
We’re testing this with 4 differents stacks of ers470. The ports are partionned as we want if someone plugs a switch and computers (that can be seen in the log)…..but….sometimes a port is partionned and there is no reason (juste a simple PC connected or a printer) and we don’t see why (no traps, no multiples times in the mac/fdb tables, just 1 adress associated with the port)
We are also testing this with three 4550……and everything works fine. The same config (i’ll post it tomorrow) is used.

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-6099 Wed, 15 Feb 2012 19:03:03 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-6099 In reply to karky.

Hi Karky,

What do you have connected to the actual port? Are you limiting the number of MAC addresses per port beyond just enabling MAC security? You might want to check the MAC/FDB table and see how many FDB entries are associated with the port(s) in question. Depending on the configuration you can end up with the same MAC appearing multiple times in the MAC/FDB tables which will trip the up MAC security if you are limiting the number of MAC addresses to be learned.

Cheers!

]]>
By: karky https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-6097 Wed, 15 Feb 2012 18:54:59 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-6097 Hello

We’re testing mac security. It seems to work perfectly with the 4550 but with our ers 470 (firmware 3.7.4) some ports are shut without reasons (no hub behind for exemple).
Has someone tried mac-security with the ers 470 ?

]]>
By: Frank https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-5631 Wed, 23 Nov 2011 12:42:37 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-5631 In reply to Dominik.

Actually, we just went the NAC route (simple MAC auth, no supplicants on our clients) for exactly that reason. The nice thing about NAC is that once it’s set up properly, it ends up being less work to handle moves, since your end user configuration policies (VLANs, QoS, filtering rules, etc) follow your users around to whatever port they happen to be plugged in to, rather than requiring manual work to keep up with your users.

]]>
By: Frank https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-5630 Wed, 23 Nov 2011 12:37:18 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-5630 In reply to Michael McNamara.

We’ve been off of our old 8600 core for about a year and a half now, so I can believe things may have changed.

A good chunk of our problems have also come from the fact that our 8300 units, which already are a little twitchy in the control plane, only had 128M mem (and some still do!). This reduces their ability to handle the various loop detection protocols in a timely fashion, and was a good chunk of our problems.

For a neat party trick, log in to an 8300 with multiple uplinks and using STP to block some of them. Type in a grep command, looking for a particular string in the PCMCIA log files, like messages about a problematic port. Hit return, and wonder why the newline doesn’t get echoed back. A few moments later, realize that the grep command is completely monopolizing the CPU, to the point where it’s not bothering to do other unimportant stuff, like processing those BPDU frames. No BPDU, links unblock, core sees a loop, boom.

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-5623 Wed, 23 Nov 2011 04:27:11 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-5623 In reply to Ioannis.

Hi Loannis,

I haven’t kicked it around myself but I believe it’s documented in this guide;

http://support.avaya.com/css/P8/documents/100099173

Cheers!

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-5621 Wed, 23 Nov 2011 04:21:29 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-5621 In reply to Frank.

Thanks for the comment Frank!

I’m curious about your comment regarding the upstream loop detection inadvertently disconnecting your edge switches before the projection could kick in at the edge. How long ago did you test this? I tested these features thoroughly about a year ago now and found with Spanning Tree w/FastStart, BPDU filtering, and rate-limiting on the edge switches that SLPP or CP-LIMIT would not kick in at the core before the edge was was locked down.

There have been changes to SLPP where you can reset the counter after a certain interval… and rate-limiting on the edge keeps CP-LIMIT from kicking off immediately.

Cheers!

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-5620 Wed, 23 Nov 2011 04:16:55 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-5620 In reply to Michel.

Thanks for the comment Michel!

]]>
By: Dominik https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-5611 Tue, 22 Nov 2011 16:32:18 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-5611 Year the hole NAC thing has it ups and downs. I like that you can configure it and it will work
with no additional cost out of the box on most Avaya switches. But if you start to activate it on all your access ports, you will have quick a lot of work to do if some changes are made in your network e.g. a user is moving to another room.

]]>
By: Ioannis https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-5603 Mon, 21 Nov 2011 13:21:19 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-5603 Nice article and great timing… I was testing MAC filtering a few days ago.

Have you tried MAC authentication against a RADIUS server? Could you give any hint on the configuration required in the switch?
I’m thinking that the best solution for our network (many buildings) is a central RADIUS server which has all the allowed MAC addresses.

]]>
By: Frank https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-5599 Sun, 20 Nov 2011 13:37:30 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-5599 Here’s another dirty trick you can use mac security for.

We’ve had a couple of buildings which had more than their fair share of loops created (bored student in a study room in the library with two ports and a patch cord…). Loop detection would of course down one of the ports, but every now and then the upstream loop detection would fire off as well, taking the whole building switch down. The edge loop detection simply couldn’t kill the loop fast enough to guarantee that the upstream loop detection wouldn’t fire.

So, in addition to spanning tree, we also configured mac security with auto learning and a max of 8 addresses on each port. This ends up downing a looped port within 10 or 20 packets, far faster than most other loop detections.

Of course, there’s one catch (isn’t there always?) If you configure this on an 8300, you need to be aware that the list of auto-learned addresses never times out until it’s manually cleared, or the link is physically downed. If you have a port with a cheapo switch at the other end and max addresses set to 8, you can have one different person plug in per week, and on the 9th week the port will go down. Other than that… let’s call it a quirk… it’s worked great for us.

]]>
By: Michel https://blog.michaelfmcnamara.com/2011/11/ethernet-routing-switch-mac-address-security/comment-page-1/#comment-5590 Sat, 19 Nov 2011 00:59:24 +0000 http://blog.michaelfmcnamara.com/?p=2049#comment-5590 Great article.
As u said is not easy to control each one port. Is important to say what kind of hardware support that configuration. Imagine how to control in a telecommunication company!

]]>