To do...
Enter system view
Set the sticky MAC aging timer
Configure a
secure MAC
address
Ignoring authorization information from the server
The authorization information is delivered by the RADIUS server to the device after an 802.1X user or
MAC authenticated user passes RADIUS authentication. You can configure a port to ignore the
authorization information from the RADIUS server.
Follow these steps to configure a port to ignore the authorization information from the RADIUS server:
To do...
Enter system view
Enter Layer 2 Ethernet interface
view
Ignore the authorization
information from the RADIUS
server
Displaying and maintaining port security
To do...
Display port security configuration
information, operation
information, and statistics about
one or more ports or all ports
Use the command...
system-view
port-security timer autolearn aging time-
value
port-security mac-address security [ sticky ]
In system view
mac-address interface interface-type
interface-number vlan vlan-id
interface interface-type interface-number
In Layer 2
Ethernet
port-security mac-address security [ sticky ]
interface view
mac-address vlan vlan-id
Use the command...
system-view
interface interface-type interface-
number
port-security authorization ignore
Use the command...
display port-security [ interface
interface-list ] [ | { begin |
exclude | include } regular-
expression ]
Remarks
—
—
Required
By default, a port uses the
authorization information from the
RADIUS server.
Remarks
Available in any view
149
Remarks
—
Optional
By default, sticky MAC
addresses do not age out,
and you can remove them
only by performing the
undo port-security mac-
address security
command, changing the
port security mode, or
disabling the port security
feature.
Required
Use either approach
No secure MAC address
is configured by default.