Glossary

station-move-violation shutdown-both
Display a list of all of the interfaces configured with MAC learning limit or station move violation.
CONFIGURATION mode
show mac learning-limit violate-action
NOTE: When the MAC learning limit (MLL) is configured as no-station-move, the MLL will be processed as static
entries internally. For static entries, the MAC address will be installed in all port-pipes, irrespective of the VLAN
membership.
Recovering from Learning Limit and Station Move Violations
After a learning-limit or station-move violation shuts down an interface, you must manually reset it.
To reset the learning limit, use the following commands.
NOTE: Alternatively, you can reset the interface by shutting it down using the shutdown command and then re-enabling it
using the no shutdown command.
Reset interfaces in the ERR_Disabled state caused by a learning limit violation or station move violation.
EXEC Privilege mode
mac learning-limit reset
Reset interfaces in the ERR_Disabled state caused by a learning limit violation.
EXEC Privilege mode
mac learning-limit reset learn-limit-violation [interface | all]
Reset interfaces in the ERR_Disabled state caused by a station move violation.
EXEC Privilege mode
mac learning-limit reset station-move-violation [interface | all]
Enabling port security
You can enable or disable port security feature globally on the Dell EMC Networking OS.
You can configure all the MAC address learning limit configurations, only if the port security is enabled on the Dell EMC
Networking OS. If the port security feature is disabled, all the interface level configurations are reset and all dynamically learnt
MAC addresses on the interfaces configured with MAC address learning limit are cleared.
To enable the port security feature globally in the system, use the following command.
Enable the port security feature.
CONFIGURATION mode
mac port-security
NIC Teaming
NIC teaming is a feature that allows multiple network interface cards in a server to be represented by one MAC address and one
IP address in order to provide transparent redundancy, balancing, and to fully utilize network adapter resources.
The following illustration shows a topology where two NICs have been teamed together. In this case, if the primary NIC fails,
traffic switches to the secondary NIC because they are represented by the same set of addresses.
506
Layer 2