185
Issuing
display port-security interface
after the number of MAC addresses learned by the port reaches
64, you see that the port security mode has changed to
secure
. When any frame with a new MAC
address arrives, intrusion protection is triggered, and you see the following traps:
#Jul 14 10:39:47:135 2009 Router PORTSEC/4/VIOLATION:Trap1.3.6.1.4.1.25506.2.26.1.3.2
An intrusion occurs!
IfIndex: 9437185
Port: 9437185
MAC Addr: 00:02:00:00:00:32
VLAN ID: 1
IfAdminStatus: 1
In addition, you see that the port security feature has disabled the port if you issue the following
command:
[Router-GigabitEthernet1/0/1] display interface gigabitethernet 1/0/1
GigabitEthernet1/0/1 current state: Port Security Disabled
IP Packet Frame Type: PKTFMT_ETHNT_2, Hardware Address: 000f-cb00-5558
Description: GigabitEthernet1/0/1 Interface
......
The port should be re-enabled 30 seconds later.
[Router-GigabitEthernet1/0/1] display interface gigabitethernet 1/0/1
GigabitEthernet1/0/1 current state: UP
IP Packet Frame Type: PKTFMT_ETHNT_2, Hardware Address: 000f-cb00-5558
Description: GigabitEthernet1/0/1 Interface
......
If you manually delete several secure MAC addresses, the port security mode of the port is restored to
autoLearn
, and the port is able to learn MAC addresses again.
Configuring the userLoginWithOUI mode
Network requirements
As shown in
, a client is connected to the Router through port GigabitEthernet 1/0/1. The
Router authenticates the client with a RADIUS server. If the authentication succeeds, the client is
authorized to access the Internet.
•
The RADIUS server at 192.168.1.2 functions as the primary authentication server and the
secondary accounting server, and the RADIUS server at 192.168.1.3 functions as the secondary
authentication server and the primary accounting server. The shared key for authentication is
name
,
and that for accounting is
money
.
•
All users use the default authentication, authorization, and accounting methods of ISP domain
sun
,
which can accommodate up to 30 users.
•
The RADIUS server response timeout time is 5 seconds, and the maximum number of RADIUS
packet retransmission attempts is five. The Router sends real-time accounting packets to the RADIUS
server at an interval of 15 minutes and sends user names without domain names to the RADIUS
server.
Configure port GigabitEthernet 1/0/1
of the Router to do the following:
•
Allow only one 802.1X user to be authenticated.
•
Allow up to 16 OUI values to be configured, and allow one terminal that uses any of the OUI
values to access the port in addition to an 802.1X user.