User`s guide
Table Of Contents
- Title
- Notice
- Contents
- Figures
- Tables
- About This Guide
- Introduction
- Local Management Requirements
- Accessing Local Management
- 3.1 Navigating Local Management Screens
- 3.2 Password Screen
- 3.3 Main Menu Screen
- 3.4 Module Selection Screen
- 3.5 Module Menu Screen
- 3.6 Overview of Security Methods
- 3.7 Security Menu Screen
- 3.8 Passwords Screen
- 3.9 Radius Configuration Screen
- 3.10 Name Services Configuration Screen
- 3.11 System Authentication Configuration Screen
- 3.12 EAP (Port) Configuration Screen
- 3.13 EAP Statistics Menu Screen
- 3.14 MAC Port Configuration Screen
- 3.15 MAC Supplicant Configuration Screen
- Chassis Menu Screens
- 4.1 Chassis Menu Screen
- 4.2 Chassis Configuration Screen
- 4.3 SNMP Configuration Menu Screen
- 4.4 SNMP Community Names Configuration Screen
- 4.5 SNMP Traps Configuration Screen
- 4.6 Chassis Environmental Information Screen
- 4.7 Redirect Configuration Menu Screen (Chassis)
- 4.8 Port Redirect Configuration Screen
- 4.9 VLAN Redirect Configuration Screen
- Module Configuration Menu Screens
- 5.1 Module Configuration Menu Screen
- 5.2 General Configuration Screen
- 5.2.1 Setting the IP Address
- 5.2.2 Setting the Subnet Mask
- 5.2.3 Setting the Default Gateway
- 5.2.4 Setting the TFTP Gateway IP Address
- 5.2.5 Setting the Module Name
- 5.2.6 Setting the Module Date
- 5.2.7 Setting the Module Time
- 5.2.8 Entering a New Screen Refresh Time
- 5.2.9 Setting the Screen Lockout Time
- 5.2.10 Configuring the COM Port
- 5.2.11 Clearing NVRAM
- 5.2.12 Enabling/Disabling IP Fragmentation
- 5.3 SNMP Configuration Menu Screen
- 5.4 SNMP Community Names Configuration Screen
- 5.5 SNMP Traps Configuration Screen
- 5.6 Access Control List Screen
- 5.7 System Resources Information Screen
- 5.8 FLASH Download Configuration Screen
- Port Configuration Menu Screens
- 6.1 Port Configuration Menu Screen
- 6.2 Ethernet Interface Configuration Screen
- 6.3 Ethernet Port Configuration Screen
- 6.4 HSIM/VHSIM Configuration Screen
- 6.5 Redirect Configuration Menu Screen
- 6.6 Port Redirect Configuration Screen
- 6.7 VLAN Redirect Configuration Screen
- 6.8 Link Aggregation Screen (802.3ad Main Menu Screen)
- 6.9 Broadcast Suppression Configuration Screen
- 802.1 Configuration Menu Screens
- 802.1Q VLAN Configuration Menu Screens
- 8.1 Summary of VLAN Local Management
- 8.2 802.1Q VLAN Configuration Menu Screen
- 8.3 Static VLAN Configuration Screen
- 8.4 Static VLAN Egress Configuration Screen
- 8.5 Current VLAN Configuration Screen
- 8.6 Current VLAN Egress Configuration Screen
- 8.7 VLAN Port Configuration Screen
- 8.8 VLAN Classification Configuration Screen
- 8.9 Protocol Port Configuration Screen
- 802.1p Configuration Menu Screens
- 9.1 802.1p Configuration Menu Screen
- 9.2 Port Priority Configuration Screen
- 9.3 Traffic Class Information Screen
- 9.4 Traffic Class Configuration Screen
- 9.5 Transmit Queues Configuration Screen
- 9.6 Priority Classification Configuration Screen
- 9.7 Protocol Port Configuration Screen
- 9.8 Rate Limiting Configuration Screen
- Layer 3 Extensions Menu Screens
- Module Statistics Menu Screens
- Network Tools Screens
- VLAN Operation and Network Applications
- 13.1 Defining VLANs
- 13.2 Types of VLANs
- 13.3 Benefits and Restrictions
- 13.4 VLAN Terms
- 13.5 VLAN Operation
- 13.6 Configuration Process
- 13.7 VLAN Switch Operation
- 13.8 VLAN Configuration
- 13.9 Summary of VLAN Local Management
- 13.10 Quick VLAN Walkthrough
- 13.11 Examples
- 13.12 Example 1, Single Switch Operation
- 13.13 Example 2, VLANs Across Multiple Switches
- 13.14 Example 3, Filtering Traffic According to a Layer 4 Classification Rule
- 13.15 Example 4, Securing Sensitive Information According to Subnet
- 13.16 Example 5, Using Dynamic Egress to Control Traffic
- 13.17 Example 6, Locking a MAC Address to a Port Using Classification Rules
- Generic Attribute Registration Protocol (GARP)
- About IGMP
- Index

Example 6, Locking a MAC Address to a Port Using Classification Rules
13-36 VLAN Operation and Network Applications
In this example, the AppleTalk traffic is routed only to AppleTalk users (ports 1, 2, 5, and 6), while
IP traffic is allowed to be seen by IP users (ports 3, 4, and 7) and by IP/AppleTalk users (ports 1, 2,
5, and 6).
13.17 EXAMPLE 6, LOCKING A MAC ADDRESS TO A PORT USING
CLASSIFICATION RULES
The following example illustrates how to add security by “locking” an individual MAC address to
a port on the switch module (S1). This would typically be done to ensure that only a particular
device can gain access to the network from a specific port. Traffic received by the switch from any
MAC address other than the one assigned to the “locked” port will be discarded.
In this example, illustrated in Figure 13-19, switch S1 will be configured to lock ports 1 and 2 to
the source address 00.00.00.00.00.0A and 00.00.00.00.00.0B of Workstation 1 and 2, respectively.
Figure 13-19 Locking Ports According to Classification Rule
13.17.1 Solving the Problem
In this example, switches S1 and S2 need to be configured with two 802.1Q VLANs. Since the
switch, by default, already has one VLAN created (the Default VLAN), only one new VLAN will
need to be created. In this example, the new VLAN will be named the Red VLAN.
The object of this is to configure S1 so that when it receives a frame on Port 1 from MAC address
00.00.00.00.00.0A, the frame is classified into the Red VLAN. When S1 receives a frame on Port
1 from a MAC address other than 00.00.00.00.00.0A, the frame is associated with the Default
VLAN. To accomplish this, S1 is configured so that the frames originating from the Red VLAN
are eligible to be forwarded out the desired ports. The frames associated with the Default VLAN
are not forwarded to any ports and are discarded by S1.
4046_25
S1
Port 1
Port 2
Locked
Ports
Uplink to Network
00.00.00.00.00.0B
Workstation 2
00.00.00.00.00.0A
Workstation 1