
iii
Configuring HABP···································································································································4-2
Configuring the HABP Server··········································································································4-2
Configuring an HABP Client ············································································································4-3
Displaying and Maintaining HABP ··········································································································4-3
HABP Configuration Example·················································································································4-3
5 MAC Authentication Configuration··········································································································5-1
MAC Authentication Overview ················································································································5-1
RADIUS-Based MAC Authentication·······························································································5-1
Local MAC Authentication ···············································································································5-1
Related Concepts····································································································································5-2
MAC Authentication Timers·············································································································5-2
Quiet MAC Address·························································································································5-2
VLAN Assigning·······························································································································5-2
ACL Assigning ·································································································································5-2
Configuring MAC Authentication·············································································································5-2
Configuration Prerequisites ·············································································································5-2
Configuration Procedure··················································································································5-3
Displaying and Maintaining MAC Authentication ····················································································5-4
MAC Authentication Configuration Examples·························································································5-4
Local MAC Authentication Configuration Example ·········································································5-4
RADIUS-Based MAC Authentication Configuration Example·························································5-6
ACL Assignment Configuration Example ························································································5-7
6 Port Security Configuration······················································································································6-1
Introduction to Port Security····················································································································6-1
Port Security Overview····················································································································6-1
Port Security Features·····················································································································6-2
Port Security Modes ························································································································6-2
Port Security Configuration Task List······································································································6-4
Enabling Port Security·····························································································································6-5
Configuration Prerequisites ·············································································································6-5
Configuration Procedure··················································································································6-5
Setting the Maximum Number of Secure MAC Addresses·····································································6-5
Setting the Port Security Mode ···············································································································6-6
Configuration Prerequisites ·············································································································6-6
Configuring Procedure·····················································································································6-7
Configuring Port Security Features·········································································································6-7
Configuring NTK······························································································································6-7
Configuring Intrusion Protection······································································································6-8
Configuring Trapping·······················································································································6-9
Configuring Secure MAC Addresses ······································································································6-9
Configuration Prerequisites ·············································································································6-9
Configuration Procedure··················································································································6-9
Ignoring Authorization Information from the Server ··············································································6-10
Displaying and Maintaining Port Security ·····························································································6-10
Port Security Configuration Examples ··································································································6-11
Configuring the autoLearn Mode···································································································6-11
Configuring the userLoginWithOUI Mode······················································································6-13
Содержание 4210G Series
Страница 459: ...4 8...
Страница 493: ...12 1...
Страница 968: ...19 6 000f e235 dc71 1 Config static GigabitEthernet 1 0 1 NOAGED 1 mac address es found...