Wired Intelligent Edge

 View Only
  • 1.  Port security inquiry

    Posted May 14, 2025 12:03 PM

    Hello,

    I am looking to apply port security to ports on my 6300 switch to restrict the type of device that can be plugged in. We are having users disconnect a Teams conference room device and plugging in their laptop to do a presentation in a conference room. I know that we cannot physically stop them from doing this, but we want to apply port security to prevent them from access the network.

    From my research and testing I can apply the following to the port to enable this.

    Port-access port-security enable

    We currently only have the port-security applied to the ports only. Through my testing I am running 'port-access port-security interface all client-status' and not seeing the switch learning the device MAC with the command being only applied to the port. In order for my test 6300 to learn the MAC of the device I have to apply the port-access command globally. Is this correct? How does applying port security globally effect the switch? Aruba documentation states the command can be applied globally or per port. Do I have to apply the 'sticky-learn' on the port in order for the port to learn the device MAC without running command globally.



  • 2.  RE: Port security inquiry

    Posted May 17, 2025 01:30 PM

    You can do per-port port-access or globally. Each should be working. You can run sticky-learn on the port without needing to run the global command.



    ------------------------------
    Shpat | ACEP | ACMP | ACCP | ACDP
    Just an Aruba enthusiast and contributor by cases
    If you find my comment helpful, KUDOS are appreciated.
    ------------------------------



  • 3.  RE: Port security inquiry

    Posted May 20, 2025 03:24 AM

    Hi, after testing, I can say that you need to first enable port access globally, then enable it per port to make the configuration work. When you enable even or, the setup may not function properly. I know what's in the documentation, but it seems you just need to enable the service on the system and then apply the configuration on the specific port.




  • 4.  RE: Port security inquiry

    Posted May 22, 2025 10:06 AM

    So we figured that out that we had to turn on the service for the switch itself before the port security would work properly.




  • 5.  RE: Port security inquiry

    Posted Jun 26, 2025 02:38 PM

    So kind of an update on this. For some of the devices we are getting connectivity issues. We have determined that applying the mac statically to the port instead of using 'sticky-learn' fixed our issue. 

    Can anyone tell me what the difference between 'sticky-learn' and applying the mac statically is? I am thinking that sticky is kind of the switch inquiring on the devices mac and then comparing the applied mac, compared to just already knowing the mac? Am I wrong?




  • 6.  RE: Port security inquiry

    Posted Jun 26, 2025 03:15 PM

    Are this silent devices that don't initiate traffic themself and are only listening? By default (at least with 802.1x/MAC auth but I think also with port-security) the outbound BUM traffic is blocked when no MAC is learned. You can change this behavior using the following config

    interface x/y/z
     port-access allow-flood-traffic enable


    ------------------------------
    Willem Bargeman
    Systems Engineer Aruba
    ACEX #125
    ------------------------------



  • 7.  RE: Port security inquiry

    Posted Jun 26, 2025 04:19 PM

    To be honest I do not know if the devices initiate traffic themselves. The devices are poly conference room devices, both a sound/mic/camera bar and tablet to access scheduling and meeting tasks. I understand that traffic is blocked if no MAC is learned but I thought that by giving the switch 'sticky-learn mac-address aa:bb:cc:dd:ee:ff vlan xx' it gives the mac that it needs to learn. If that mac is not present on the link it blocks traffic.