i
Table of Contents
1 Port Security Configuration······················································································································1-1
Introduction to Port Security····················································································································1-1
Port Security Overview····················································································································1-1
Port Security Features·····················································································································1-2
Port Security Modes ························································································································1-2
Port Security Configuration Task List······································································································1-4
Enabling Port Security·····························································································································1-5
Configuration Prerequisites·············································································································1-5
Configuration Procedure··················································································································1-5
Setting the Maximum Number of Secure MAC Addresses·····································································1-5
Setting the Port Security Mode ···············································································································1-6
Configuration Prerequisites·············································································································1-6
Configuring Procedure·····················································································································1-7
Configuring Port Security Features·········································································································1-7
Configuring NTK······························································································································1-7
Configuring Intrusion Protection······································································································1-8
Configuring Trapping·······················································································································1-9
Configuring Secure MAC Addresses ······································································································1-9
Configuration Prerequisites·············································································································1-9
Configuration Procedure··················································································································1-9
Ignoring Authorization Information from the Server··············································································1-10
Displaying and Maintaining Port Security ·····························································································1-10
Port Security Configuration Examples ··································································································1-11
Configuring the autoLearn Mode···································································································1-11
Configuring the userLoginWithOUI Mode······················································································1-13
Configuring the macAddressElseUserLoginSecure Mode····························································1-17
Troubleshooting Port Security···············································································································1-19
Cannot Set the Port Security Mode·······························································································1-19
Cannot Configure Secure MAC Addresses···················································································1-19
Cannot Change Port Security Mode When a User Is Online ························································1-20