EasyManua.ls Logo

H3C S3100 8C SI - Port Security Configuration;Port Binding Configuration

H3C S3100 8C SI
944 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Operation Manual – Port Security-Port Binding
H3C S3100 Series Ethernet Switches Table of Contents
i
Table of Contents
Chapter 1 Port Security Configuration........................................................................................ 1-1
1.1 Port Security Overview ...................................................................................................... 1-1
1.1.1 Introduction.............................................................................................................. 1-1
1.1.2 Port Security Features ............................................................................................1-1
1.1.3 Port Security Modes................................................................................................ 1-2
1.2 Port Security Configuration Task List ................................................................................ 1-5
1.2.1 Enabling Port Security............................................................................................. 1-5
1.2.2 Setting the Maximum Number of MAC Addresses Allowed on a Port.................... 1-6
1.2.3 Setting the Port Security Mode ............................................................................... 1-7
1.2.4 Configuring Port Security Features......................................................................... 1-8
1.2.5 Ignoring the Authorization Information from the RADIUS Server ......................... 1-10
1.2.6 Configuring Security MAC Addresses................................................................... 1-10
1.3 Displaying and Maintaining Port Security Configuration.................................................. 1-11
1.4 Port Security Configuration Example............................................................................... 1-12
1.4.1 Port Security Configuration Example.................................................................... 1-12
Chapter 2 Port Binding Configuration......................................................................................... 2-1
2.1 Port Binding Overview ....................................................................................................... 2-1
2.1.1 Introduction.............................................................................................................. 2-1
2.1.2 Configuring Port Binding .........................................................................................2-1
2.2 Displaying and Maintaining Port Binding Configuration..................................................... 2-2
2.3 Port Binding Configuration Example.................................................................................. 2-2
2.3.1 Port Binding Configuration Example....................................................................... 2-2

Table of Contents

Related product manuals