Navigation
Table of Contents
Guide That Contains This Content
[+] Expand All
[-] Collapse All
Related Documentation
- EX Series
- Example: Configuring Basic Port Security Features
- Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses, to Protect the Switch from Ethernet Switching Table Overflow Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
- QFX Series
- Configuring MAC Limiting
- Example: Configuring Basic Port Security Features
- Verifying That MAC Limiting Is Working Correctly
- Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses, to Protect the Switch from Ethernet Switching Table Overflow Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
Configuring the none Action to Override a MAC Limit Applied to All Interfaces (CLI Procedure)
If you set a MAC limit in your port security settings to apply to all interfaces, you can override that setting for a particular interface by specifying the action none.
To use the none action to override a MAC limit setting:
- Set the MAC limit for all interfaces—for example,
a limit of 5 with action drop:
[edit ethernet-switching-options secure-access-port]
user@switch# set interface all mac-limit (Access Port Security) 5 action drop - Change the action for one interface with this command.
[edit ethernet-switching-options secure-access-port]
user@switch# set interface xe-0/0/2 mac-limit action none
Related Documentation
- EX Series
- Example: Configuring Basic Port Security Features
- Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses, to Protect the Switch from Ethernet Switching Table Overflow Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
- QFX Series
- Configuring MAC Limiting
- Example: Configuring Basic Port Security Features
- Verifying That MAC Limiting Is Working Correctly
- Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses, to Protect the Switch from Ethernet Switching Table Overflow Attacks
- Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks

