
Operation Manual – Port Security
H3C S5500-EI Series Ethernet Switches
Chapter 1 Port Security Configuration
1-1
Chapter 1 Port Security Configuration
When configuring port security, go to these sections for information you are interested
in:
z
Introduction to Port Security
z
Port Security Configuration Task List
z
Displaying and Maintaining Port Security
z
Port Security Configuration Examples
z
Troubleshooting Port Security
1.1 Introduction to Port Security
1.1.1 Port Security Overview
Port security is a MAC address-based security mechanism for network access
controlling. It is an extension to the existing 802.1x authentication and MAC
authentication. It controls the access of unauthorized devices to the network by
checking the source MAC address of an inbound frame and the access to unauthorized
devices by checking the destination MAC address of an outbound frame.
With port security, you can define various port security modes to make a device learn
only legal source MAC addresses, so that you can implement different network security
management as needed. When a port security-enabled device detects an illegal frame,
it triggers the corresponding port security feature and takes a pre-defined action
automatically. This reduces your maintenance workload and greatly enhances system
security.
The following types of frames are classified as illegal:
z
Received frames with unknown source MAC addresses when MAC address
learning is disabled.
z
Received frames with unknown source MAC addresses when the number of MAC
addresses learned by the port has already reached the upper limit.
z
Frames from unauthenticated users.
1.1.2 Port Security Features
I. NTK
The need to know (NTK) feature checks the destination MAC addresses in outbound
frames and allows frames to be sent to only devices passing authentication, thus
preventing illegal devices from intercepting network traffic.