Operation Manual – Port Security
H3C S5500-EI Series Ethernet Switches Table of Contents
i
Table of Contents
Chapter 1 Port Security Configuration........................................................................................1-1
1.1 Introduction to Port Security ..............................................................................................1-1
1.1.1 Port Security Overview............................................................................................1-1
1.1.2 Port Security Features ............................................................................................1-1
1.1.3 Port Security Modes................................................................................................1-2
1.2 Port Security Configuration Task List ................................................................................1-4
1.3 Enabling Port Security.......................................................................................................1-4
1.3.1 Configuration Prerequisites.....................................................................................1-4
1.3.2 Configuration Procedure.........................................................................................1-4
1.4 Setting the Maximum Number of Secure MAC Addresses................................................1-5
1.5 Setting the Port Security Mode..........................................................................................1-6
1.5.1 Enabling the autoLearn Mode.................................................................................1-6
1.5.2 Enabling the userLoginWithOUI Mode....................................................................1-7
1.5.3 Enabling any other Port Security Mode ..................................................................1-7
1.6 Configuring Port Security Features....................................................................................1-8
1.6.1 Configuring NTK......................................................................................................1-8
1.6.2 Configuring Intrusion Protection..............................................................................1-8
1.6.3 Configuring Trapping...............................................................................................1-9
1.7 Configuring Secure MAC Addresses.................................................................................1-9
1.7.1 Configuration Prerequisites...................................................................................1-10
1.7.2 Configuration Procedure.......................................................................................1-10
1.8 Ignoring the Authorization Information from the Server...................................................1-10
1.9 Displaying and Maintaining Port Security........................................................................1-11
1.10 Port Security Configuration Examples...........................................................................1-11
1.10.1 Port Security Configuration for autoLearn Mode.................................................1-11
1.10.2 Port Security Configuration for userLoginWithOUI Mode...................................1-14
1.10.3 Port Security Configuration for macAddressElseUserLoginSecure Mode.................. 1-18
1.11 Troubleshooting Port Security .......................................................................................1-21
1.11.1 Cannot Set the Port Security Mode ....................................................................1-21
1.11.2 Cannot Configure Secure MAC Addresses ........................................................1-22
1.11.3 Cannot Change Port Security Mode When a User Is Online..............................1-22