
128
C
HAPTER
12: P
ORT
S
ECURITY
C
ONFIGURATION
Configuring the Trap feature
Ignoring the
Authorization
Information from the
RADIUS Server
After an 802.1x user or MAC-authenticated user passes Remote Authentication
Dial-In User Service (RADIUS) authentication, the RADIUS server delivers the
authorization information to the device. You can configure a port to ignore the
authorization information from the RADIUS server.
Configuring Security
MAC Addresses
Security MAC addresses are special MAC addresses that never age out. One
security MAC address can be added to only one port in the same VLAN so that you
can bind a MAC address to one port in the same VLAN.
Security MAC addresses can be learned by the auto-learn function of port security
or manually configured.
Before adding security MAC addresses to a port, you must configure the port
security mode to
autolearn
. After this configuration, the port changes its way of
learning MAC addresses as follows.
■
The port deletes original dynamic MAC addresses;
■
If the amount of security MAC addresses has not yet reach the maximum
number, the port will learn new MAC addresses and turn them to security
MAC addresses;
■
If the amount of security MAC addresses reaches the maximum number, the
port will not be able to learn new MAC addresses and the port mode will be
changed from
autolearn
to
secure
.
n
The security MAC addresses manually configured are written to the configuration
file; they will not get lost when the port is up or down. As long as the
configuration file is saved, the security MAC addresses can be restored after the
switch reboots.
Table 84
Configure port security trapping
Operation
Command
Remarks
Enter system view
system-view
-
Enable sending traps for the
specified type of event
port-security trap {
addresslearned |
dot1xlogfailure |
dot1xlogoff | dot1xlogon |
intrusion | ralmlogfailure |
ralmlogoff | ralmlogon }
Required
By default, no trap is sent.
Table 85
Configure a port to ignore the authorization information from the RADIUS
server
Operation
Command
Remarks
Enter system view
system-view
-
Enter Ethernet port view
interface
interface-type
interface-number
-
Ignore the authorization
information from the RADIUS
server
port-security authorization
ignore
Required
By default, a port uses the
authorization information
from the RADIUS server.
Содержание 4210 PWR
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION...
Страница 340: ...338 CHAPTER 30 CLUSTER...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT...