iiiConfiguring HABP ···································································································································4-2Configuring the HABP Server··········································································································4-2Configuring an HABP Client ············································································································4-3Displaying and Maintaining HABP ··········································································································4-3HABP Configuration Example·················································································································4-35 MAC Authentication Configuration··········································································································5-1MAC Authentication Overview ················································································································5-1RADIUS-Based MAC Authentication·······························································································5-1Local MAC Authentication ···············································································································5-1Related Concepts····································································································································5-2MAC Authentication Timers·············································································································5-2Quiet MAC Address·························································································································5-2VLAN Assigning·······························································································································5-2ACL Assigning ·································································································································5-2Configuring MAC Authentication·············································································································5-2Configuration Prerequisites ·············································································································5-2Configuration Procedure··················································································································5-3Displaying and Maintaining MAC Authentication ····················································································5-4MAC Authentication Configuration Examples·························································································5-4Local MAC Authentication Configuration Example ·········································································5-4RADIUS-Based MAC Authentication Configuration Example ·························································5-6ACL Assignment Configuration Example ························································································5-76 Port Security Configuration······················································································································6-1Introduction to Port Security····················································································································6-1Port Security Overview ····················································································································6-1Port Security Features·····················································································································6-2Port Security Modes ························································································································6-2Port Security Configuration Task List······································································································6-4Enabling Port Security·····························································································································6-5Configuration Prerequisites ·············································································································6-5Configuration Procedure··················································································································6-5Setting the Maximum Number of Secure MAC Addresses·····································································6-5Setting the Port Security Mode ···············································································································6-6Configuration Prerequisites ·············································································································6-6Configuring Procedure·····················································································································6-7Configuring Port Security Features·········································································································6-7Configuring NTK ······························································································································6-7Configuring Intrusion Protection ······································································································6-8Configuring Trapping ·······················································································································6-9Configuring Secure MAC Addresses ······································································································6-9Configuration Prerequisites ·············································································································6-9Configuration Procedure··················································································································6-9Ignoring Authorization Information from the Server ··············································································6-10Displaying and Maintaining Port Security ·····························································································6-10Port Security Configuration Examples ··································································································6-11Configuring the autoLearn Mode···································································································6-11Configuring the userLoginWithOUI Mode······················································································6-13