i 
Table of Contents 
1 Port Security Configuration······················································································································1-1 
Port Security Overview····························································································································1-1 
Introduction······································································································································1-1 
Port Security Features·····················································································································1-1 
Port Security Modes ························································································································1-1 
Port Security Configuration Task List······································································································1-4 
Enabling Port Security·····················································································································1-5 
Setting the Maximum Number of MAC Addresses Allowed on a Port ············································1-5 
Setting the Port Security Mode········································································································1-6 
Configuring Port Security Features ·································································································1-7 
Configuring Guest VLAN for a Port in macAddressOrUserLoginSecure mode······························1-8 
Ignoring the Authorization Information from the RADIUS Server····················································1-9 
Configuring Security MAC Addresses···························································································1-10 
Displaying and Maintaining Port Security Configuration·······································································1-11 
Port Security Configuration Example····································································································1-12 
Port Security Configuration Example ····························································································1-12 
Guest VLAN Configuration Example·····························································································1-13 
2 Port Binding Configuration ······················································································································2-1 
Port Binding Overview·····························································································································2-1 
Introduction······································································································································2-1 
Configuring Port Binding ·················································································································2-1 
Displaying and Maintaining Port Binding Configuration··········································································2-2 
Port Binding Configuration Example·······································································································2-2 
Port Binding Configuration Example ·······························································································2-2