H3C Technologies H3C S3100 Series Switches User Manual

Page 171

Advertising
background image

i

Table of Contents

1 Port Security Configuration······················································································································1-1

Port Security Overview····························································································································1-1

Introduction······································································································································1-1

Port Security Features·····················································································································1-1

Port Security Modes ························································································································1-1

Port Security Configuration Task List······································································································1-4

Enabling Port Security ·····················································································································1-5

Setting the Maximum Number of MAC Addresses Allowed on a Port ············································1-5

Setting the Port Security Mode········································································································1-6

Configuring Port Security Features ·································································································1-7

Configuring Guest VLAN for a Port in macAddressOrUserLoginSecure mode ······························1-8

Ignoring the Authorization Information from the RADIUS Server····················································1-9

Configuring Security MAC Addresses ···························································································1-10

Displaying and Maintaining Port Security Configuration·······································································1-11

Port Security Configuration Example ····································································································1-12

Port Security Configuration Example ····························································································1-12

Guest VLAN Configuration Example ·····························································································1-13

2 Port Binding Configuration ······················································································································2-1

Port Binding Overview·····························································································································2-1

Introduction······································································································································2-1

Configuring Port Binding ·················································································································2-2

Displaying and Maintaining Port Binding Configuration··········································································2-2

Port Binding Configuration Example ·······································································································2-2

Port Binding Configuration Example ·······························································································2-2

Advertising