1-5
Enabling Port Security
Configuration Prerequisites
Before enabling port security, you need to disable 802.1X and MAC authentication globally.
Configuration Procedure
Follow these steps to enable port security:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enable port security
port-security enable
Required
Disabled by default
Note that:
1) Enabling port security resets the following configurations on a port to the bracketed defaults. Then,
values of these configurations cannot be changed manually; the system will adjust them based on
the port security mode automatically:
z
802.1X (disabled), port access control method (macbased), and port access control mode (auto)
z
MAC authentication (disabled)
2) Disabling port security resets the following configurations on a port to the bracketed defaults:
z
Port security mode (noRestrictions)
z
802.1X (disabled), port access control method (macbased), and port access control mode (auto)
z
MAC authentication (disabled)
3) Port security cannot be disabled if there is any user present on a port.
z
For detailed 802.1X configuration, refer to
802.1X Configuration
in the
Security Volume
.
z
For detailed MAC-based authentication configuration, refer to
MAC Authentication Configuration
in
the
Security Volume
.
Setting the Maximum Number of Secure MAC Addresses
With port security enabled, more than one authenticated user is allowed on a port. The number of
authenticated users allowed, however, cannot exceed the specified upper limit.
By setting the maximum number of secure MAC addresses allowed on a port, you can:
z
Control the maximum number of users who are allowed to access the network through the port.
z
Control the number of secure MAC addresses that can be added with port security.
Содержание 4500G PWR 24-Port
Страница 200: ...1 5 ProviderB GigabitEthernet1 0 2 undo stp enable ProviderB GigabitEthernet1 0 2 bpdu tunnel dot1q stp ...
Страница 252: ...1 7 Clearing ARP entries from the ARP table may cause communication failures ...
Страница 362: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1 ...
Страница 407: ...1 8 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete ...
Страница 786: ...1 16 3 In the case of PIM SM use the display current configuration command to check the BSR and RP information ...
Страница 1387: ...1 23 ...
Страница 1443: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 1720: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5 ...