Overview ························································································································································ 224
Port security features ····························································································································· 224
Port security modes ······························································································································· 224
Configuration task list ····································································································································· 227
Enabling port security ···································································································································· 228
Setting the port security mode ······················································································································· 229
Configuring NTK ····································································································································· 230
Configuration prerequisites ···················································································································· 232
Configuration procedure ························································································································· 232
Enabling MAC move ······································································································································ 233
Troubleshooting port security ························································································································· 244
Overview ························································································································································ 245
Password setting ···································································································································· 245
User login control ··································································································································· 247
Logging ·················································································································································· 248
FIPS compliance ············································································································································ 248
Enabling password control ····························································································································· 249
Network requirements ···························································································································· 253
Configuration procedure ························································································································· 253
Verifying the configuration ······················································································································ 255
Configuring keychains ················································································· 256
Overview ························································································································································ 256
Configuration procedure ································································································································ 256
Keychain configuration example ···················································································································· 257
Network requirements ···························································································································· 257
Configuration procedure ························································································································· 258
Verifying the configuration ······················································································································ 259
v