281 
Item Descri
tion
Port Security 
See Table 98. 
Parameters such as authentication type and encryption type determine the port 
mode. For more information, see Table 106.  
After you select the Cipher Suit
e option, the following four port security modes 
are added: 
•  mac and psk—MAC-based authentication must be performed on access 
users first. If MAC-based authentication succeeds, an access user has to use 
the pre-configured PSK to negotiate with the device. Access to the port is 
allowed only after the negotiation succeeds.  
•  psk—An access user must use the pre-shared key (PSK) that is 
pre-configured to negotiate with the device. The access to the port is 
allowed only after the negotiation succeeds.  
•  userlogin-secure-ext—Perform MAC-based 802.1X authentication for 
access users. In this mode, the port supports multiple 802.1X users. 
 
a.  Configure mac and psk 
Figure 278 mac and psk port security configuration page 
 
 
Table 104 Configuration items 
Item Descri
tion
Port Mode 
mac and psk—MAC-based authentication must be performed on access 
users first. If MAC-based authentication succeeds, an access user has to use 
the pre-configured PSK to negotiate with the device. Access to the port is 
allowed only after the negotiation succeeds.  
Select Wireless Service > Access Service from the navigation tree, and click 
MAC Authentication List to enter the page for configuring a MAC 
authentication list. On the page, enter the MAC address of the client. 
Max User 
Control the maximum number of users allowed to access the network through 
the port.  
MAC Authentication  Select MAC Authentication.