EasyManua.ls Logo

3Com 4510G - Page 538

3Com 4510G
1166 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
iii
Configuring HABP···································································································································4-2
Configuring the HABP Server··········································································································4-2
Configuring an HABP Client············································································································4-3
Displaying and Maintaining HABP ··········································································································4-3
HABP Configuration Example·················································································································4-3
5 MAC Authentication Configuration··········································································································5-1
MAC Authentication Overview ················································································································5-1
RADIUS-Based MAC Authentication·······························································································5-1
Local MAC Authentication···············································································································5-1
Related Concepts····································································································································5-2
MAC Authentication Timers·············································································································5-2
Quiet MAC Address·························································································································5-2
VLAN Assigning·······························································································································5-2
ACL Assigning·································································································································5-2
Configuring MAC Authentication·············································································································5-2
Configuration Prerequisites ·············································································································5-2
Configuration Procedure··················································································································5-3
Displaying and Maintaining MAC Authentication····················································································5-4
MAC Authentication Configuration Examples·························································································5-4
Local MAC Authentication Configuration Example ·········································································5-4
RADIUS-Based MAC Authentication Configuration Example·························································5-6
ACL Assignment Configuration Example························································································5-7
6 Port Security Configuration······················································································································6-1
Introduction to Port Security····················································································································6-1
Port Security Overview····················································································································6-1
Port Security Features·····················································································································6-2
Port Security Modes ························································································································6-2
Port Security Configuration Task List······································································································6-4
Enabling Port Security·····························································································································6-5
Configuration Prerequisites ·············································································································6-5
Configuration Procedure··················································································································6-5
Setting the Maximum Number of Secure MAC Addresses·····································································6-5
Setting the Port Security Mode ···············································································································6-6
Configuration Prerequisites ·············································································································6-6
Configuring Procedure·····················································································································6-7
Configuring Port Security Features·········································································································6-7
Configuring NTK······························································································································6-7
Configuring Intrusion Protection······································································································6-8
Configuring Trapping·······················································································································6-9
Configuring Secure MAC Addresses ······································································································6-9
Configuration Prerequisites ·············································································································6-9
Configuration Procedure··················································································································6-9
Ignoring Authorization Information from the Server··············································································6-10
Displaying and Maintaining Port Security ·····························································································6-10
Port Security Configuration Examples ··································································································6-11
Configuring the autoLearn Mode···································································································6-11
Configuring the userLoginWithOUI Mode······················································································6-13

Table of Contents

Related product manuals