HP 4800G Series Configuration Manual page 1302

24/48 port
Table of Contents

Advertisement

1 Port Security Configuration······················································································································1-1
Introduction to Port Security····················································································································1-1
Port Security Overview ····················································································································1-1
Port Security Features·····················································································································1-2
Port Security Modes ························································································································1-2
Port Security Configuration Task List······································································································1-4
Enabling Port Security·····························································································································1-5
Configuration Prerequisites ·············································································································1-5
Configuration Procedure··················································································································1-5
Setting the Maximum Number of Secure MAC Addresses·····································································1-5
Setting the Port Security Mode ···············································································································1-6
Configuration Prerequisites ·············································································································1-6
Configuring Procedure·····················································································································1-7
Configuring Port Security Features·········································································································1-7
Configuring NTK ······························································································································1-7
Configuring Trapping ·······················································································································1-9
Configuring Secure MAC Addresses ······································································································1-9
Configuration Prerequisites ·············································································································1-9
Configuration Procedure··················································································································1-9
Ignoring Authorization Information from the Server ··············································································1-10
Displaying and Maintaining Port Security ·····························································································1-10
Port Security Configuration Examples ··································································································1-11
Configuring the autoLearn Mode···································································································1-11
Configuring the userLoginWithOUI Mode······················································································1-13
Configuring the macAddressElseUserLoginSecure Mode ····························································1-17
Troubleshooting Port Security···············································································································1-19
Cannot Set the Port Security Mode·······························································································1-19
Cannot Configure Secure MAC Addresses···················································································1-20
Cannot Change Port Security Mode When a User Is Online ························································1-20
Table of Contents
i

Advertisement

Chapters

Table of Contents
loading

Table of Contents