Operation Manual – Port Security
H3C S5500-EI Series Ethernet Switches
Table of Contents
i
Table of Contents
Chapter 1 Port Security Configuration........................................................................................ 1-1
1.1 Introduction to Port Security .............................................................................................. 1-1
1.1.1 Port Security Overview............................................................................................ 1-1
1.1.2 Port Security Features ............................................................................................ 1-1
1.1.3 Port Security Modes ................................................................................................ 1-2
1.2 Port Security Configuration Task List ................................................................................ 1-4
1.3 Enabling Port Security ....................................................................................................... 1-4
1.3.1 Configuration Prerequisites..................................................................................... 1-4
1.3.2 Configuration Procedure ......................................................................................... 1-4
1.4 Setting the Maximum Number of Secure MAC Addresses................................................ 1-5
1.5 Setting the Port Security Mode .......................................................................................... 1-6
1.5.1 Enabling the autoLearn Mode ................................................................................. 1-6
1.5.2 Enabling the userLoginWithOUI Mode.................................................................... 1-7
1.5.3 Enabling any other Port Security Mode .................................................................. 1-7
1.6 Configuring Port Security Features.................................................................................... 1-8
1.6.1 Configuring NTK...................................................................................................... 1-8
1.6.2 Configuring Intrusion Protection.............................................................................. 1-8
1.6.3 Configuring Trapping............................................................................................... 1-9
1.7 Configuring Secure MAC Addresses ................................................................................. 1-9
1.7.1 Configuration Prerequisites................................................................................... 1-10
1.7.2 Configuration Procedure ....................................................................................... 1-10
1.8 Ignoring the Authorization Information from the Server................................................... 1-10
1.9 Displaying and Maintaining Port Security ........................................................................ 1-11
1.10 Port Security Configuration Examples ........................................................................... 1-11
1.10.1 Port Security Configuration for autoLearn Mode................................................. 1-11
1.10.2 Port Security Configuration for userLoginWithOUI Mode ................................... 1-14
1.10.3 Port Security Configuration for macAddressElseUserLoginSecure Mode.................. 1-18
1.11 Troubleshooting Port Security ....................................................................................... 1-21
1.11.1 Cannot Set the Port Security Mode .................................................................... 1-21
1.11.2 Cannot Configure Secure MAC Addresses ........................................................ 1-22
1.11.3 Cannot Change Port Security Mode When a User Is Online.............................. 1-22