iii
Configuring HABP···································································································································4-2
Configuring the HABP Server··········································································································4-2
Configuring an HABP Client············································································································4-3
Displaying and Maintaining HABP ··········································································································4-3
HABP Configuration Example·················································································································4-3
5 MAC Authentication Configuration··········································································································5-1
MAC Authentication Overview ················································································································5-1
RADIUS-Based MAC Authentication·······························································································5-1
Local MAC Authentication···············································································································5-1
Related Concepts····································································································································5-2
MAC Authentication Timers·············································································································5-2
Quiet MAC Address·························································································································5-2
VLAN Assigning·······························································································································5-2
ACL Assigning·································································································································5-2
Configuring MAC Authentication·············································································································5-2
Configuration Prerequisites ·············································································································5-2
Configuration Procedure··················································································································5-3
Displaying and Maintaining MAC Authentication····················································································5-4
MAC Authentication Configuration Examples·························································································5-4
Local MAC Authentication Configuration Example ·········································································5-4
RADIUS-Based MAC Authentication Configuration Example·························································5-6
ACL Assignment Configuration Example························································································5-7
6 Port Security Configuration······················································································································6-1
Introduction to Port Security····················································································································6-1
Port Security Overview····················································································································6-1
Port Security Features·····················································································································6-2
Port Security Modes ························································································································6-2
Port Security Configuration Task List······································································································6-4
Enabling Port Security·····························································································································6-5
Configuration Prerequisites ·············································································································6-5
Configuration Procedure··················································································································6-5
Setting the Maximum Number of Secure MAC Addresses·····································································6-5
Setting the Port Security Mode ···············································································································6-6
Configuration Prerequisites ·············································································································6-6
Configuring Procedure·····················································································································6-7
Configuring Port Security Features·········································································································6-7
Configuring NTK······························································································································6-7
Configuring Intrusion Protection······································································································6-8
Configuring Trapping·······················································································································6-9
Configuring Secure MAC Addresses ······································································································6-9
Configuration Prerequisites ·············································································································6-9
Configuration Procedure··················································································································6-9
Ignoring Authorization Information from the Server··············································································6-10
Displaying and Maintaining Port Security ·····························································································6-10
Port Security Configuration Examples ··································································································6-11
Configuring the autoLearn Mode···································································································6-11
Configuring the userLoginWithOUI Mode······················································································6-13