EasyManua.ls Logo

3Com 4210G Series - Page 496

3Com 4210G Series
1133 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
iii
Configuring HABP···································································································································4-2
Configuring the HABP Server··········································································································4-2
Configuring an HABP Client ············································································································4-3
Displaying and Maintaining HABP ··········································································································4-3
HABP Configuration Example·················································································································4-3
5 MAC Authentication Configuration··········································································································5-1
MAC Authentication Overview ················································································································5-1
RADIUS-Based MAC Authentication·······························································································5-1
Local MAC Authentication ···············································································································5-1
Related Concepts····································································································································5-2
MAC Authentication Timers·············································································································5-2
Quiet MAC Address·························································································································5-2
VLAN Assigning·······························································································································5-2
ACL Assigning ·································································································································5-2
Configuring MAC Authentication·············································································································5-2
Configuration Prerequisites ·············································································································5-2
Configuration Procedure··················································································································5-3
Displaying and Maintaining MAC Authentication ····················································································5-4
MAC Authentication Configuration Examples·························································································5-4
Local MAC Authentication Configuration Example ·········································································5-4
RADIUS-Based MAC Authentication Configuration Example·························································5-6
ACL Assignment Configuration Example ························································································5-7
6 Port Security Configuration······················································································································6-1
Introduction to Port Security····················································································································6-1
Port Security Overview····················································································································6-1
Port Security Features·····················································································································6-2
Port Security Modes ························································································································6-2
Port Security Configuration Task List······································································································6-4
Enabling Port Security·····························································································································6-5
Configuration Prerequisites ·············································································································6-5
Configuration Procedure··················································································································6-5
Setting the Maximum Number of Secure MAC Addresses·····································································6-5
Setting the Port Security Mode ···············································································································6-6
Configuration Prerequisites ·············································································································6-6
Configuring Procedure·····················································································································6-7
Configuring Port Security Features·········································································································6-7
Configuring NTK ······························································································································6-7
Configuring Intrusion Protection ······································································································6-8
Configuring Trapping·······················································································································6-9
Configuring Secure MAC Addresses ······································································································6-9
Configuration Prerequisites ·············································································································6-9
Configuration Procedure··················································································································6-9
Ignoring Authorization Information from the Server ··············································································6-10
Displaying and Maintaining Port Security ·····························································································6-10
Port Security Configuration Examples ··································································································6-11
Configuring the autoLearn Mode···································································································6-11
Configuring the userLoginWithOUI Mode······················································································6-13

Table of Contents

Other manuals for 3Com 4210G Series

Related product manuals