Operation Manual – Port Security-Port Binding
H3C S3600 Series Ethernet Switches-Release 1510 Chapter 1
Port Security Configuration
1-3
Security
mode
Description Feature
userlogin
-secure
The port is enabled only after an access user
passes the 802.1x authentication. When the port
is enabled, only the packets of the successfully
authenticated user can pass through the port.
In this mode, only one 802.1x-authenticated user
is allowed to access the port.
When the port changes from the normal mode to
this security mode, the system automatically
removes the existing dynamic MAC address
entries and authenticated MAC address entries on
the port.
userlogin
-withoui
This mode is similar to the userlogin-secure
mode, except that, besides the packets of the
single 802.1x-authenticated user, the packets
whose source MAC addresses have a particular
OUI are also allowed to pass through the port.
When the port changes from the normal mode to
this security mode, the system automatically
removes the existing dynamic/authenticated MAC
address entries on the port.
mac-auth
entication
In this mode, MAC address–based authentication
is performed for access users.
userlogin
-secure-o
r-mac
In this mode, if either of the mac-authentication
and userlogin-secure modes succeeds, the user
passes the authentication.
mac-else-
userlogin
-secure
In this mode, first the MAC-based authentication is
performed. If this authentication succeeds, the
mac-authentication mode is adopted, or else, the
authentication in userlogin-secure mode is
performed.
userlogin
-secure-e
xt
This mode is similar to the userlogin-secure
mode, except that there can be more than one
802.1x-authenticated user on the port.
userlogin
-secure-o
r-mac-ext
This mode is similar to the
userlogin-secure-or-mac mode, except that
there can be more than one 802.1x-authenticated
user on the port.
mac-else-
userlogin
-secure-e
xt
This mode is similar to the
mac-else-userlogin-secure mode, except that
there can be more than one 802.1x-authenticated
user on the port.
In any of these
modes, the
device will trigger
NTK and
intrusion
protection upon
detecting an
illegal packet.