Configuration Guide Port-based Flow Control Configuration
Configuring Port Security
Default Configuration of Port Security
The table below shows the default configuration of port security:
Port Security Configuration Guide
The following restrictions apply to port security configuration:
A secure port is not an Aggregate Port.
A secure port is not the destination port of SPAN.
A secure port is and can only be an Access Port.
The 802.1x authentication and port security are mutually exclusive in enabling. The 802.1x
authentication and port security can ensure the validity of the network users. You can enable either of
them to control port access.
At the same time, the secure addresses of the IP+MAC addresses and IP addresses share with the
ACLs the hardware resources of the system. Therefore, when you apply the ACLs on one secure port,
the IP+MAC addresses and IP addresses on the port can be configured with less secure addresses.
The secure addresses for the same secure port must have the same format, namely either all or none
of them are bound with IP addresses. If a security port includes these two types of security addresses
at the same time, the secure address not bound with the IP address will fail (the secure address
bound with the IP address has a high priority).
Configuration of Secure Ports and Violation Handling Modes
In the interface configuration mode, configure secure ports and violation handling modes by using the
following commands: