Operation Manual – Port Security-Port BindingH3C S5600 Series Ethernet Switches Chapter 1 Port Security Configuration1-10III. Configuring the Trap featureFollow these steps to configure port security trapping:To do... Use the command... RemarksEnter system view system-view —Enable sendingtraps for thespecified type ofeventport-security trap { addresslearned |dot1xlogfailure | dot1xlogoff |dot1xlogon | intrusion | ralmlogfailure |ralmlogoff | ralmlogon }RequiredBy default, notrap is sent.1.2.5 Ignoring the Authorization Information from the RADIUS ServerAfter an 802.1x user or MAC-authenticated user passes Remote Authentication Dial-InUser Service (RADIUS) authentication, the RADIUS server delivers the authorizationinformation to the device. You can configure a port to ignore the authorizationinformation from the RADIUS server.Follow these steps to configure a port to ignore the authorization information from theRADIUS server:To do... Use the command... RemarksEnter system view system-view —Enter Ethernet port view interface interface-typeinterface-number —Ignore the authorizationinformation from theRADIUS serverport-securityauthorization ignoreRequiredBy default, a port uses theauthorization informationfrom the RADIUS server.1.2.6 Configuring Security MAC AddressesSecurity MAC addresses are special MAC addresses that never age out. One securityMAC address can be added to only one port in the same VLAN so that you can bind aMAC address to one port in the same VLAN.Security MAC addresses can be learned by the auto-learn function of port security ormanually configured.Before adding security MAC addresses to a port, you must configure the port securitymode to autolearn. After this configuration, the port changes its way of learning MACaddresses as follows.z The port deletes original dynamic MAC addresses;