iii 
Configuring HABP···································································································································4-2 
Configuring the HABP Server··········································································································4-2 
Configuring an HABP Client ············································································································4-3 
Displaying and Maintaining HABP ··········································································································4-3 
HABP Configuration Example·················································································································4-3 
5 MAC Authentication Configuration··········································································································5-1 
MAC Authentication Overview ················································································································5-1 
RADIUS-Based MAC Authentication·······························································································5-1 
Local MAC Authentication ···············································································································5-1 
Related Concepts····································································································································5-2 
MAC Authentication Timers·············································································································5-2 
Quiet MAC Address·························································································································5-2 
VLAN Assigning·······························································································································5-2 
ACL Assigning ·································································································································5-2 
Configuring MAC Authentication·············································································································5-2 
Configuration Prerequisites ·············································································································5-2 
Configuration Procedure··················································································································5-3 
Displaying and Maintaining MAC Authentication ····················································································5-4 
MAC Authentication Configuration Examples·························································································5-4 
Local MAC Authentication Configuration Example ·········································································5-4 
RADIUS-Based MAC Authentication Configuration Example·························································5-6 
ACL Assignment Configuration Example ························································································5-7 
6 Port Security Configuration······················································································································6-1 
Introduction to Port Security····················································································································6-1 
Port Security Overview····················································································································6-1 
Port Security Features·····················································································································6-2 
Port Security Modes ························································································································6-2 
Port Security Configuration Task List······································································································6-4 
Enabling Port Security·····························································································································6-5 
Configuration Prerequisites ·············································································································6-5 
Configuration Procedure··················································································································6-5 
Setting the Maximum Number of Secure MAC Addresses·····································································6-5 
Setting the Port Security Mode ···············································································································6-6 
Configuration Prerequisites ·············································································································6-6 
Configuring Procedure·····················································································································6-7 
Configuring Port Security Features·········································································································6-7 
Configuring NTK ······························································································································6-7 
Configuring Intrusion Protection ······································································································6-8 
Configuring Trapping·······················································································································6-9 
Configuring Secure MAC Addresses ······································································································6-9 
Configuration Prerequisites ·············································································································6-9 
Configuration Procedure··················································································································6-9 
Ignoring Authorization Information from the Server ··············································································6-10 
Displaying and Maintaining Port Security ·····························································································6-10 
Port Security Configuration Examples ··································································································6-11 
Configuring the autoLearn Mode···································································································6-11 
Configuring the userLoginWithOUI Mode······················································································6-13