EasyManua.ls Logo

3Com 4200G 48-Port - Port Security Configuration;Port Binding Configuration

3Com 4200G 48-Port
730 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
i
Table of Contents
1 Port Security Configuration······················································································································1-1
Port Security Overview····························································································································1-1
Introduction······································································································································1-1
Port Security Features·····················································································································1-1
Port Security Modes ························································································································1-1
Port Security Configuration Task List······································································································1-4
Enabling Port Security·····················································································································1-5
Setting the Maximum Number of MAC Addresses Allowed on a Port ············································1-5
Setting the Port Security Mode········································································································1-6
Configuring Port Security Features ·································································································1-7
Ignoring the Authorization Information from the RADIUS Server····················································1-8
Configuring Security MAC Addresses·····························································································1-9
Displaying and Maintaining Port Security Configuration·······································································1-10
Port Security Configuration Example····································································································1-10
Port Security Configuration Example ····························································································1-10
2 Port Binding Configuration ······················································································································2-1
Port Binding Overview·····························································································································2-1
Introduction······································································································································2-1
Configuring Port Binding ·················································································································2-1
Displaying and Maintaining Port Binding Configuration··········································································2-1
Port Binding Configuration Example·······································································································2-2
Port Binding Configuration Example ·······························································································2-2

Table of Contents

Related product manuals