6-4
z
Currently, port security supports two authentication methods: 802.1X and MAC authentication.
Different port security modes employ different authentication methods or different combinations of
authentication methods.
z
The maximum number of users a port supports is the lesser of the maximum number of secure
MAC addresses or the maximum number of authenticated users the security mode supports. For
example, in userLoginSecureExt mode, the maximum number of users a port supports is the
lesser of the maximum number of secure MAC addresses configured or the maximum number of
users that 802.1X supports.
These security mode naming rules may help you remember the modes:
z
userLogin
specifies port-based 802.1X authentication.
z
macAddress
specifies MAC address authentication.
z
Else
specifies that the authentication method before
Else
is applied first. If the authentication fails,
the protocol type of the authentication request determines whether to turn to the authentication
method following the
Else
.
z
In a security mode with
Or
, the protocol type of the authentication request determines which
authentication method is to be used. However, 802.1X authentication is preferred by wireless
users.
z
userLogin with Secure
specifies MAC-based 802.1X authentication.
z
Ext
indicates allowing multiple 802.1X users to be authenticated and get online. A security mode
without
Ext
allows only one 802.1X user to be authenticated and get online.
Port Security Configuration Task List
Complete the following tasks to configure port security:
Task
Remarks
Enabling Port Security
Required
Setting the Maximum Number of Secure MAC Addresses
Optional
Setting the Port Security Mode
Required
Configuring NTK
Configuring Intrusion Protection
Configuring Port Security Features
Configuring Trapping
Optional
Choose one or
more features as
required.
Configuring Secure MAC Addresses
Optional
Ignoring Authorization Information from the Server
Optional