i
Table of Contents
1 Port Security Configuration······················································································································1-1
Introduction to Port Security····················································································································1-1
Port Security Overview ····················································································································1-1
Port Security Features·····················································································································1-1
Port Security Modes ························································································································1-2
Support for Guest VLAN··················································································································1-5
Port Security Configuration Task List······································································································1-5
Enabling Port Security·····························································································································1-5
Configuration Prerequisites ·············································································································1-5
Configuration Procedure··················································································································1-5
Setting the Maximum Number of Secure MAC Addresses·····································································1-6
Setting the Port Security Mode ···············································································································1-7
Configuration Prerequisites ·············································································································1-7
Configuring Procedure·····················································································································1-7
Configuring Port Security Features·········································································································1-8
Configuring NTK ······························································································································1-8
Configuring Intrusion Protection ······································································································1-9
Configuring Trapping ·······················································································································1-9
Configuring Secure MAC Addresses ····································································································1-10
Configuration Prerequisites ···········································································································1-10
Configuration Procedure················································································································1-10
Ignoring Authorization Information from the Server ··············································································1-10
Displaying and Maintaining Port Security ·····························································································1-11
Port Security Configuration Examples ··································································································1-11
Configuring the autoLearn Mode···································································································1-11
Configuring the userLoginWithOUI Mode······················································································1-13
Configuring the macAddressElseUserLoginSecure Mode ····························································1-17
Troubleshooting Port Security···············································································································1-19
Cannot Set the Port Security Mode·······························································································1-19
Cannot Configure Secure MAC Addresses···················································································1-20
Cannot Change Port Security Mode When a User Is Online ························································1-20