Operation Manual – Port Security-Port BindingH3C S3100 Series Ethernet Switches Table of ContentsiTable of ContentsChapter 1 Port Security Configuration........................................................................................ 1-11.1 Port Security Overview ...................................................................................................... 1-11.1.1 Introduction.............................................................................................................. 1-11.1.2 Port Security Features ............................................................................................ 1-11.1.3 Port Security Modes................................................................................................ 1-21.2 Port Security Configuration Task List ................................................................................ 1-51.2.1 Enabling Port Security............................................................................................. 1-51.2.2 Setting the Maximum Number of MAC Addresses Allowed on a Port .................... 1-61.2.3 Setting the Port Security Mode ............................................................................... 1-71.2.4 Configuring Port Security Features ......................................................................... 1-81.2.5 Ignoring the Authorization Information from the RADIUS Server ......................... 1-101.2.6 Configuring Security MAC Addresses................................................................... 1-101.3 Displaying and Maintaining Port Security Configuration.................................................. 1-111.4 Port Security Configuration Example............................................................................... 1-121.4.1 Port Security Configuration Example .................................................................... 1-12Chapter 2 Port Binding Configuration......................................................................................... 2-12.1 Port Binding Overview ....................................................................................................... 2-12.1.1 Introduction.............................................................................................................. 2-12.1.2 Configuring Port Binding ......................................................................................... 2-12.2 Displaying and Maintaining Port Binding Configuration..................................................... 2-22.3 Port Binding Configuration Example.................................................................................. 2-22.3.1 Port Binding Configuration Example ....................................................................... 2-2