Supported Platforms
Related Documentation
- EX Series
- mac-limit (Access Port Security)
- Configuring MAC Limiting (CLI Procedure)
- EX, QFX Series
- Example: Configuring Basic Port Security Features
- Example: Configuring Allowed MAC Addresses to Protect the Switch from DHCP Snooping Database Alteration Attacks
- Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses, to Protect the Switch from Ethernet Switching Table Overflow Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
allowed-mac
Syntax
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description
Specify particular MAC addresses to be added to the MAC address cache.
![]() | Note: Although this configuration restricts the addresses that can be added to the MAC address cache, it does not block the switch from receiving Layer 2 control packets—such as Link Layer Discovery Protocol (LLDP) packets—transmitted from MAC addresses that are not specified in the list of allowed MAC addresses. Control packets do not undergo the MAC address check and they are therefore included in the statistics of packets received. However, they are not forwarded to another destination. They are trapped within the switch. |
Default
Allowed MAC addresses take precedence over dynamic MAC values that have been applied with the mac-limit statement.
Options
mac-address-list—One or more MAC addresses configured as allowed MAC addresses for a specified interface or all interfaces.
Required Privilege Level
system—To view this statement in the configuration.
system–control—To add this statement to the
configuration.
Related Documentation
- EX Series
- mac-limit (Access Port Security)
- Configuring MAC Limiting (CLI Procedure)
- EX, QFX Series
- Example: Configuring Basic Port Security Features
- Example: Configuring Allowed MAC Addresses to Protect the Switch from DHCP Snooping Database Alteration Attacks
- Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses, to Protect the Switch from Ethernet Switching Table Overflow Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
Published: 2012-12-07
Supported Platforms
Related Documentation
- EX Series
- mac-limit (Access Port Security)
- Configuring MAC Limiting (CLI Procedure)
- EX, QFX Series
- Example: Configuring Basic Port Security Features
- Example: Configuring Allowed MAC Addresses to Protect the Switch from DHCP Snooping Database Alteration Attacks
- Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses, to Protect the Switch from Ethernet Switching Table Overflow Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks