Navigation
Supported Platforms
Related Documentation
- EX, QFX Series
- Example: Configuring Basic Port Security Features
- Example: Configuring Allowed MAC Addresses to Protect the Switch from DHCP Snooping Database Alteration Attacks
- Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses, to Protect the Switch from Ethernet Switching Table Overflow Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
- Configuring Static IP Addresses for DHCP Bindings on Access Ports (CLI Procedure)
- EX Series
- Configuring MAC Limiting (CLI Procedure)
interface (Access Port Security)
Syntax
interface (all | interface-name) {allowed-mac {mac-address-list;}(dhcp-trusted | no-dhcp-trusted);fcoe-trusted;mac-limit limit action action;no-allowed-mac-log;persistent-learning;static-ip ip-address {vlan vlan-name;mac mac-address; }}vlan vlan-name {mac-limit limit action action;}}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description
Apply port security features to all interfaces or to the specified interface.
Options
all—Apply port security features to all interfaces.
interface-name —Apply port security features to the specified interface.
The remaining statements are explained separately.
Required Privilege Level
system—To view this statement in the configuration.
system-control—To add this statement to the configuration.
Related Documentation
- EX, QFX Series
- Example: Configuring Basic Port Security Features
- Example: Configuring Allowed MAC Addresses to Protect the Switch from DHCP Snooping Database Alteration Attacks
- Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses, to Protect the Switch from Ethernet Switching Table Overflow Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
- Configuring Static IP Addresses for DHCP Bindings on Access Ports (CLI Procedure)
- EX Series
- Configuring MAC Limiting (CLI Procedure)
Published: 2012-12-10
Supported Platforms
Related Documentation
- EX, QFX Series
- Example: Configuring Basic Port Security Features
- Example: Configuring Allowed MAC Addresses to Protect the Switch from DHCP Snooping Database Alteration Attacks
- Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses, to Protect the Switch from Ethernet Switching Table Overflow Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
- Configuring Static IP Addresses for DHCP Bindings on Access Ports (CLI Procedure)
- EX Series
- Configuring MAC Limiting (CLI Procedure)