Configuration task list ···················································································································································· 85
Enabling port security ···················································································································································· 85
Setting the port security mode ······································································································································ 86
Configuring NTK ··················································································································································· 87
Configuring secure MAC addresses ···························································································································· 88
Configuration prerequisites ·································································································································· 89
Configuration procedure ······································································································································ 89
autoLearn configuration example ································································································································· 90
Network requirements ··········································································································································· 90
Configuration procedure ······································································································································ 91
Verifying the configuration ··································································································································· 91
Network requirements ··········································································································································· 92
Configuration procedure ······································································································································ 93
Verifying the configuration ··································································································································· 94
Network requirements ··········································································································································· 95
Configuration procedure ······································································································································ 96
Verifying the configuration ··································································································································· 96
Troubleshooting port security ········································································································································ 98
Configuring password control ································································································································ 100
Overview ······································································································································································· 100
Password setting ·················································································································································· 100
User login control ················································································································································ 102
Logging ································································································································································· 102
Enabling password control ········································································································································· 103
Managing public keys ············································································································································ 109
Overview ······································································································································································· 109
Creating a local key pair ············································································································································ 109
Configuration guidelines ···································································································································· 109
Configuration procedure ···································································································································· 110
Displaying a host public key ······························································································································ 111
Destroying a local key pair ········································································································································· 112
Configuring a peer public key ···································································································································· 112
iii