
1-8
If you configure the NTK feature and execute the
port-security intrusion-mode blockmac
command
on the same port, the switch will be unable to disable the packets whose destination MAC address is
illegal from being sent out that port; that is, the NTK feature configured will not take effect on the packets
whose destination MAC address is illegal.
Configuring the Trap feature
Follow these steps to configure port security trapping:
To do...
Use the command...
Remarks
Enter system view
system-view
—
Enable sending traps for the
specified type of event
port-security trap
{
addresslearned
|
dot1xlogfailure
|
dot1xlogoff
|
dot1xlogon
|
intrusion
|
ralmlogfailure
|
ralmlogoff
|
ralmlogon
}
Required
By default, no
trap is sent.
Ignoring the Authorization Information from the RADIUS Server
After an 802.1x user or MAC-authenticated user passes Remote Authentication Dial-In User Service
(RADIUS) authentication, the RADIUS server delivers the authorization information to the device. You
can configure a port to ignore the authorization information from the RADIUS server.
Follow these steps to configure a port to ignore the authorization information from the RADIUS server:
To do...
Use the command...
Remarks
Enter system view
system-view
—
Enter Ethernet port view
interface
interface-type
interface-number
—
Ignore the authorization
information from the RADIUS
server
port-security authorization
ignore
Required
By default, a port uses the
authorization information from
the RADIUS server.
Configuring Security MAC Addresses
Security MAC addresses are special MAC addresses that never age out. One security MAC address
can be added to only one port in the same VLAN so that you can bind a MAC address to one port in the
same VLAN.
Security MAC addresses can be learned by the auto-learn function of port security or manually
configured.
Before adding security MAC addresses to a port, you must configure the port security mode to
autolearn
. After this configuration, the port changes its way of learning MAC addresses as follows.
z
The port deletes original dynamic MAC addresses;
Summary of Contents for H3C S5100-SI
Page 129: ...1 10...
Page 522: ...ii...
Page 701: ...3 2...
Page 797: ...1 20 0 00 packet loss round trip min avg max 50 60 70 ms...
Page 827: ...i Table of Contents 1 Acronyms 1 1...