Netgear XCM8806 - 8800 SERIES 6-SLOT CHASSIS SWITCH 사용자 설명서
![Netgear](https://files.manualsbrain.com/attachments/cf1ad5de25a3f8d6c88ef0ab489c1b137eebe11f/common/fit/150/50/17742d1e0cdacf24edeb88c30757620088415c5f7699f69b4517262e21e0/brand_logo.jpeg)
Chapter 10. FDB
|
279
NETGEAR 8800 User Manual
Note:
The MAC-based VLAN netlogin parameter applies only for the
NETGEAR 8800 series switches. See
for more information on netlogin.
With no options, the command displays all FDB entries. (The age parameter does not show
on the display for the backup MSM/MM on modular switches; it does show on the display for
the primary MSM/MM.)
on the display for the backup MSM/MM on modular switches; it does show on the display for
the primary MSM/MM.)
Displaying FDB Statistics
To display FDB statistics, use the following command:
show fdb stats {{ports {all | <port_list>} | vlan {all} | {vlan} <vlan_name> }
{no-refresh}}
With no options, the command displays summary FDB statistics.
MAC-Based Security
MAC-based security allows you to control the way the FDB is learned and populated. By
managing entries in the FDB, you can block and control packet flows on a per-address basis.
managing entries in the FDB, you can block and control packet flows on a per-address basis.
Note:
MAC-based security is not supported on BlackDiamond 20800
series switches in this software release.
MAC-based security allows you to limit the number of dynamically-learned MAC addresses
allowed per virtual port. You can also “lock” the FDB entries for a virtual port, so that the
current entries will not change, and no additional addresses can be learned on the port.
allowed per virtual port. You can also “lock” the FDB entries for a virtual port, so that the
current entries will not change, and no additional addresses can be learned on the port.
You can also prioritize or stop packet flows based on the source MAC address of the ingress
VLAN or the destination MAC address of the egress VLAN.
VLAN or the destination MAC address of the egress VLAN.
Note:
For detailed information about MAC-based security, see
.
This section describes the following topics: