lkpdavid.blogg.se

Juniper ex4300 mac table size
Juniper ex4300 mac table size










juniper ex4300 mac table size

It’s bizarre how difficult this answer was to find. What have others done? Has anyone else found a way around this dynamically? I’m not sure if this was the design goal, but from someone who is in a heavy transition to Juniper, I find this shortcoming a big deal since 802.1X is not yet feasible in our environment. show ethernet-switching table persistent-macĭefault 00:10:94:00:00:02 installed ge-0/0/1.0 Now comes the strange part, if you change the port, JUNOS automatically migrates the mac-address over to the port it sees the mac-address on next. show ethernet-switching table persistent-macĭefault 00:10:94:00:00:02 installed ge-0/0/0.0 showĪfter verifying the mac-address has been registered persistently. We will also assume we are using the same laptop in the Cisco example. Also, yes, I understand that the family ethernet-switching commands are missing. Now, the configuration that will net you the same desired outcome in JUNOS are as follows. Although this isn’t a security control, per se, it does work twofold in ensuring the administrator has proper port control with a fully populated 6550, this might mean the difference of entire floors, VLANs, or even subnets. It’s more of a basic switch function not really knowing what to do with more than 2 mac-address entires being registered on the same switch. Now, from my understanding, this isn’t necessarily a security mechanism.

juniper ex4300 mac table size

CiscoSwitch>show interface statusįa0/1 notconnect 1 auto auto 10/100BaseTXįa0/2 err-disabled 1 auto auto 10/100BaseTXįa0/3 notconnect 1 auto auto 10/100BaseTXįa0/4 notconnect 1 auto auto 10/100BaseTXįa0/5 notconnect 1 auto auto 10/100BaseTXįa0/6 notconnect 1 auto auto 10/100BaseTX

juniper ex4300 mac table size

Obviously, Cisco switches will throw the port into an err-disabled state since port Fa0/2 is attempting to connect with a mac-address that is already registered on the switch. Now, let’s say an end user has the mobility of a laptop, and decides to plug the laptop in somewhere else we’ll assume they plug into port Fa0/2 on the same switch. Switchport port-security mac-address sticky 0010.9400.0002 Switchport port-security mac-address sticky Switchport port-security violation restrict I’ll elaborate.īelow, you can see that port Fa0/1 is configured for sticky-mac, and once a device is plugged into the port, it loads the mac address into running-configuration for that single port. I’m trying to figure out if there is an inherent flaw in the way JUNOS handles sticky-mac addresses across their switch-ports versus how Cisco handles them.












Juniper ex4300 mac table size