To be honest I do not know if the devices initiate traffic themselves. The devices are poly conference room devices, both a sound/mic/camera bar and tablet to access scheduling and meeting tasks. I understand that traffic is blocked if no MAC is learned but I thought that by giving the switch 'sticky-learn mac-address aa:bb:cc:dd:ee:ff vlan xx' it gives the mac that it needs to learn. If that mac is not present on the link it blocks traffic.
Original Message:
Sent: Jun 26, 2025 03:15 PM
From: willembargeman
Subject: Port security inquiry
Are this silent devices that don't initiate traffic themself and are only listening? By default (at least with 802.1x/MAC auth but I think also with port-security) the outbound BUM traffic is blocked when no MAC is learned. You can change this behavior using the following config
interface x/y/z port-access allow-flood-traffic enable
------------------------------
Willem Bargeman
Systems Engineer Aruba
ACEX #125
Original Message:
Sent: Jun 26, 2025 02:37 PM
From: Russ_Altorfer
Subject: Port security inquiry
So kind of an update on this. For some of the devices we are getting connectivity issues. We have determined that applying the mac statically to the port instead of using 'sticky-learn' fixed our issue.
Can anyone tell me what the difference between 'sticky-learn' and applying the mac statically is? I am thinking that sticky is kind of the switch inquiring on the devices mac and then comparing the applied mac, compared to just already knowing the mac? Am I wrong?
Original Message:
Sent: May 14, 2025 12:03 PM
From: Russ_Altorfer
Subject: Port security inquiry
Hello,
I am looking to apply port security to ports on my 6300 switch to restrict the type of device that can be plugged in. We are having users disconnect a Teams conference room device and plugging in their laptop to do a presentation in a conference room. I know that we cannot physically stop them from doing this, but we want to apply port security to prevent them from access the network.
From my research and testing I can apply the following to the port to enable this.
Port-access port-security enable
We currently only have the port-security applied to the ports only. Through my testing I am running 'port-access port-security interface all client-status' and not seeing the switch learning the device MAC with the command being only applied to the port. In order for my test 6300 to learn the MAC of the device I have to apply the port-access command globally. Is this correct? How does applying port security globally effect the switch? Aruba documentation states the command can be applied globally or per port. Do I have to apply the 'sticky-learn' on the port in order for the port to learn the device MAC without running command globally.