Operation Manual – Port SecurityH3C S5500-EI Series Ethernet Switches Table of ContentsiTable of ContentsChapter 1 Port Security Configuration........................................................................................ 1-11.1 Introduction to Port Security .............................................................................................. 1-11.1.1 Port Security Overview............................................................................................ 1-11.1.2 Port Security Features ............................................................................................ 1-11.1.3 Port Security Modes................................................................................................ 1-21.2 Port Security Configuration Task List ................................................................................ 1-41.3 Enabling Port Security ....................................................................................................... 1-41.3.1 Configuration Prerequisites..................................................................................... 1-41.3.2 Configuration Procedure ......................................................................................... 1-41.4 Setting the Maximum Number of Secure MAC Addresses................................................ 1-51.5 Setting the Port Security Mode .......................................................................................... 1-61.5.1 Enabling the autoLearn Mode ................................................................................. 1-61.5.2 Enabling the userLoginWithOUI Mode.................................................................... 1-71.5.3 Enabling any other Port Security Mode .................................................................. 1-71.6 Configuring Port Security Features.................................................................................... 1-81.6.1 Configuring NTK...................................................................................................... 1-81.6.2 Configuring Intrusion Protection.............................................................................. 1-81.6.3 Configuring Trapping............................................................................................... 1-91.7 Configuring Secure MAC Addresses ................................................................................. 1-91.7.1 Configuration Prerequisites................................................................................... 1-101.7.2 Configuration Procedure ....................................................................................... 1-101.8 Ignoring the Authorization Information from the Server................................................... 1-101.9 Displaying and Maintaining Port Security ........................................................................ 1-111.10 Port Security Configuration Examples........................................................................... 1-111.10.1 Port Security Configuration for autoLearn Mode................................................. 1-111.10.2 Port Security Configuration for userLoginWithOUI Mode ................................... 1-141.10.3 Port Security Configuration for macAddressElseUserLoginSecure Mode.................. 1-181.11 Troubleshooting Port Security ....................................................................................... 1-211.11.1 Cannot Set the Port Security Mode .................................................................... 1-211.11.2 Cannot Configure Secure MAC Addresses ........................................................ 1-221.11.3 Cannot Change Port Security Mode When a User Is Online.............................. 1-22