Navigation
Supported Platforms
Related Documentation
- EX Series
- allowed-mac
- Configuring MAC Limiting (J-Web Procedure)
- EX Series, QFabric System, QFX Series standalone switches
- Example: Configuring Basic Port Security Features
- Example: Configuring Allowed MAC Addresses to Protect the Switch from DHCP Snooping Database Alteration Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
- EX Series, QFX Series standalone switches
- Configuring MAC Limiting (CLI Procedure)
no-allowed-mac-log
Syntax
no-allowed-mac-log;
Hierarchy Level
[edit ethernet-switching-options secure-access-port interface (all | interface-name)]
Release Information
Statement introduced in Junos OS Release 9.3 for EX Series switches.
Description
Specify that the switch does not log messages when it receives packets from invalid MAC addresses on an interface that has been configured for particular (allowed) MAC addresses.
Default
The switch logs messages when it receives packets from invalid MAC addresses on an interface that has been configured for particular (allowed) MAC addresses.
Required Privilege Level
system—To view this statement in the configuration.
system–control—To add this statement to the
configuration.
Related Documentation
- EX Series
- allowed-mac
- Configuring MAC Limiting (J-Web Procedure)
- EX Series, QFabric System, QFX Series standalone switches
- Example: Configuring Basic Port Security Features
- Example: Configuring Allowed MAC Addresses to Protect the Switch from DHCP Snooping Database Alteration Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
- EX Series, QFX Series standalone switches
- Configuring MAC Limiting (CLI Procedure)
Published: 2014-04-23
Supported Platforms
Related Documentation
- EX Series
- allowed-mac
- Configuring MAC Limiting (J-Web Procedure)
- EX Series, QFabric System, QFX Series standalone switches
- Example: Configuring Basic Port Security Features
- Example: Configuring Allowed MAC Addresses to Protect the Switch from DHCP Snooping Database Alteration Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
- EX Series, QFX Series standalone switches
- Configuring MAC Limiting (CLI Procedure)