i
Table of Contents
1 Port Security Configuration······················································································································1-1
Port Security Overview····························································································································1-1
Introduction······································································································································1-1
Port Security Features·····················································································································1-1
Port Security Modes ························································································································1-1
Port Security Configuration Task List······································································································1-4
Enabling Port Security ·····················································································································1-5
Setting the Maximum Number of MAC Addresses Allowed on a Port ············································1-5
Setting the Port Security Mode········································································································1-6
Configuring Port Security Features ·································································································1-7
Configuring Guest VLAN for a Port in macAddressOrUserLoginSecure mode ······························1-8
Ignoring the Authorization Information from the RADIUS Server····················································1-9
Configuring Security MAC Addresses ···························································································1-10
Displaying and Maintaining Port Security Configuration·······································································1-11
Port Security Configuration Example ····································································································1-12
Port Security Configuration Example ····························································································1-12
Guest VLAN Configuration Example ·····························································································1-13
2 Port Binding Configuration ······················································································································2-1
Port Binding Overview·····························································································································2-1
Introduction······································································································································2-1
Configuring Port Binding ·················································································································2-1
Displaying and Maintaining Port Binding Configuration··········································································2-2
Port Binding Configuration Example ·······································································································2-2
Port Binding Configuration Example ·······························································································2-2
Содержание Switch 4210 52-Port
Страница 253: ...ii Configuring Dropping Unknown Multicast Packets 3 2 Displaying Common Multicast Configuration 3 3 ...
Страница 434: ...3 13 Switch Ethernet1 0 2 ip source static binding ip address 1 1 1 1 mac address 0001 0001 0001 ...
Страница 675: ...ii Configuring a Scheduled Task 5 1 Scheduled Task Configuration Example 5 2 ...
Страница 695: ...2 2 ...
Страница 867: ...i Table of Contents Appendix A Acronyms A 1 ...