Ignoring The Authorization Information From The Radius Server; Configuring Security Mac Addresses - H3C S5100-SI Operation Manual

Ethernet switches
Hide thumbs Also See for H3C S5100-SI:
Table of Contents

Advertisement

If you configure the NTK feature and execute the port-security intrusion-mode blockmac command
on the same port, the switch will be unable to disable the packets whose destination MAC address is
illegal from being sent out that port; that is, the NTK feature configured will not take effect on the packets
whose destination MAC address is illegal.
Configuring the Trap feature
Follow these steps to configure port security trapping:
To do...
Enter system view
Enable sending traps for the
specified type of event

Ignoring the Authorization Information from the RADIUS Server

After an 802.1x user or MAC-authenticated user passes Remote Authentication Dial-In User Service
(RADIUS) authentication, the RADIUS server delivers the authorization information to the device. You
can configure a port to ignore the authorization information from the RADIUS server.
Follow these steps to configure a port to ignore the authorization information from the RADIUS server:
To do...
Enter system view
Enter Ethernet port view
Ignore the authorization
information from the RADIUS
server

Configuring Security MAC Addresses

Security MAC addresses are special MAC addresses that never age out. One security MAC address
can be added to only one port in the same VLAN so that you can bind a MAC address to one port in the
same VLAN.
Security MAC addresses can be learned by the auto-learn function of port security or manually
configured.
Before adding security MAC addresses to a port, you must configure the port security mode to
autolearn. After this configuration, the port changes its way of learning MAC addresses as follows.
The port deletes original dynamic MAC addresses;
Use the command...
system-view
port-security trap { addresslearned |
dot1xlogfailure | dot1xlogoff | dot1xlogon |
intrusion | ralmlogfailure | ralmlogoff |
ralmlogon }
Use the command...
system-view
interface interface-type
interface-number
port-security authorization
ignore
1-8
Remarks
Required
By default, no
trap is sent.
Remarks
Required
By default, a port uses the
authorization information from
the RADIUS server.

Advertisement

Table of Contents
loading

This manual is also suitable for:

H3c s5100-ei

Table of Contents