i
Table of Contents
1 Port Security Configuration······················································································································1-1
Port Security Overview····························································································································1-1
Introduction······································································································································1-1
Port Security Features·····················································································································1-1
Port Security Modes ························································································································1-1
Port Security Configuration Task List······································································································1-4
Enabling Port Security·····················································································································1-5
Setting the Maximum Number of MAC Addresses Allowed on a Port ············································1-5
Setting the Port Security Mode········································································································1-6
Configuring Port Security Features ·································································································1-7
Configuring Guest VLAN for a Port in macAddressOrUserLoginSecure mode······························1-8
Ignoring the Authorization Information from the RADIUS Server··················································1-10
Configuring Security MAC Addresses···························································································1-10
Displaying and Maintaining Port Security Configuration·······································································1-12
Port Security Configuration Examples ··································································································1-12
Port Security Configuration Example ····························································································1-12
Guest VLAN Configuration Example·····························································································1-13