110
For non-802.1X frames, a port in this mode performs only MAC authentication. For 802.1X frames, it
performs MAC authentication and then, if the authentication fails, 802.1X authentication.
macAddressElseUserLoginSecureExt
This mode is similar to the macAddressElseUserLoginSecure mode except that a port in this mode
supports multiple 802.1X and MAC authentication users, as the keyword
Ext
implies.
The maximum number of users a port supports equals the maximum number of MAC addresses that port
security allows or the maximum number of concurrent users the authentication mode in use allows,
whichever is smaller. For example, if 802.1X allows less concurrent users than port security’s limit on the
number of MAC addresses on the port in userLoginSecureExt mode, port security’s limit takes effect.
For more information about configuring MAC address table entries, see
Layer 2—LAN Switching
Configuration Guide
.
Support for guest VLAN and Auth-Fail VLAN
An 802.1X guest VLAN is the VLAN that a user is in before initiating authentication. An 802.1X Auth-
Fail VLAN or a MAC authentication guest VLAN is the VLAN that a user is in after failing authentication.
Support for the guest VLAN and Auth-Fail VLAN features varies with security modes.
•
You can use the 802.1X guest VLAN and 802.1X Auth-Fail VLAN features together with port
security modes that support 802.1X authentication. For more information about the 802.1X guest
VLAN and Auth-Fail VLAN on a port that performs MAC-based access control, see "
•
You can use the MAC authentication VLAN feature together with security modes that support MAC
authentication. For more information about the MAC authentication guest VLAN, see "
If you configure both an 802.1X Auth-Fail VLAN and a MAC authentication guest VLAN on a port that
performs MAC-based access control, the 802.1X Auth-Fail VLAN has a higher priority.
Port security configuration task list
Task Remarks
Required
Setting port security’s limit on the number of MAC addresses on a port
Optional
Setting the port security mode
Required
Configuring port security
features
Optional
Configure one or more
features as required.
Configuring intrusion protection
Configuring secure MAC addresses
Optional
Ignoring authorization information from the server
Optional