Andrew,
Thanks for the correction. In case of unknown MAC receive from known interface, where set of MACIP rules are applied, what will be behavior of MACIP for new MAC. I think so, it will drop those frames. That's not what Mustafa is asking in his previous email about dropping of those frames. Thanks?, Mohsin ________________________________ From: Andrew Yourtchenko <ayour...@gmail.com> Sent: Monday, February 12, 2018 11:23 PM To: Mohsin Kazmi (sykazmi) Cc: vpp-dev@lists.fd.io Subject: Re: [vpp-dev] Port security Mohsin, Not really, macip acl only nails down the predefined known addresses. Mostafa, To implement the functionality you are looking for, you would need to write new code. --a On 12 Feb 2018, at 23:20, Mohsin Kazmi <syka...@cisco.com<mailto:syka...@cisco.com>> wrote: Hi Mostafa, Port Security functional can be implemented using ACL plugin MACIP feature. On a given interface, ACLs are applied on input traffic to permit using a mix of MAC and IP. Here you will find more detail about it: https://wiki.fd.io/view/VPP/SecurityGroups#MACIP_.28formerly_.22L2.22.29_API Cheers, Mohsin? ________________________________ From: vpp-dev@lists.fd.io<mailto:vpp-dev@lists.fd.io> <vpp-dev@lists.fd.io<mailto:vpp-dev@lists.fd.io>> on behalf of Mostafa Salari <msg...@gmail.com<mailto:msg...@gmail.com>> Sent: Saturday, February 10, 2018 10:55 AM To: vpp-dev@lists.fd.io<mailto:vpp-dev@lists.fd.io> Subject: [vpp-dev] Port security Hi How can i apply port-security functionality with vpp? In summary, before a new MAC come into mac-table, some special functions must be triggered. Those functions, determine whether the new mac is allowed to connect or not, and if not, what action should be performed? Actions are: increasing a violation counter, dropping the packet and (sometimes) turning the incomming interface down! Any help is appreciated. Regards