beautypg.com

H3C Technologies H3C S7500E Series Switches User Manual

Page 10

background image

iv

Configuring Re-DHCP Portal Authentication with Extended Functions ········································8-25

Configuring Layer 3 Portal Authentication with Extended Functions ············································8-28

Troubleshooting Portal ··························································································································8-30

Inconsistent Keys on the Access Device and the Portal Server ···················································8-30

Incorrect Server Port Number on the Access Device····································································8-31

9 Port Security Configuration······················································································································9-1

Introduction to Port Security····················································································································9-1

Port Security Overview ····················································································································9-1

Port Security Features·····················································································································9-2

Port Security Modes ························································································································9-2

Support for Guest VLAN and Auth-Fail VLAN·················································································9-5

Port Security Configuration Task List······································································································9-5

Enabling Port Security·····························································································································9-6

Configuration Prerequisites ·············································································································9-6

Configuration Procedure··················································································································9-6

Setting the Maximum Number of Secure MAC Addresses·····································································9-7

Setting the Port Security Mode ···············································································································9-7

Configuration Prerequisites ·············································································································9-7

Configuration Procedure··················································································································9-8

Configuring Port Security Features·········································································································9-9

Configuring NTK ······························································································································9-9

Configuring Intrusion Protection ····································································································9-10

Configuring Trapping ·····················································································································9-10

Configuring Secure MAC Addresses ····································································································9-11

Configuration Prerequisites ···········································································································9-11

Configuration Procedure················································································································9-11

Ignoring Authorization Information from the Server ··············································································9-12

Displaying and Maintaining Port Security ·····························································································9-12

Port Security Configuration Examples ··································································································9-13

Configuring the autoLearn Mode···································································································9-13

Configuring the userLoginWithOUI Mode······················································································9-15

Configuring the macAddressElseUserLoginSecure Mode ····························································9-19

Troubleshooting Port Security···············································································································9-22

Cannot Set the Port Security Mode·······························································································9-22

Cannot Configure Secure MAC Addresses···················································································9-22

Cannot Change Port Security Mode When a User Is Online ························································9-23

10 User Profile Configuration····················································································································10-1

User Profile Overview ···························································································································10-1

User Profile Configuration Task List ·····································································································10-1

Creating a User Profile··························································································································10-2

Configuration Prerequisites ···········································································································10-2

Creating a User Profile ··················································································································10-2

Configuring a User Profile ·····················································································································10-2

Enabling a User Profile ·························································································································10-3

Displaying and Maintaining User Profile ·······························································································10-4