H3C Technologies H3C WX6000 Series Access Controllers User Manual
Page 10
v
Port Security Configuration Task List····································································································19-3
Enabling Port Security···························································································································19-4
Configuration Prerequisites ···········································································································19-4
Configuration Procedure················································································································19-4
Setting the Maximum Number of Secure MAC Addresses···································································19-5
Setting the Port Security Mode ·············································································································19-5
Enabling the autoLearn Mode ·······································································································19-6
Enabling the userLoginWithOUI Mode ··························································································19-6
Enabling any other Port Security Mode·························································································19-7
Configuring Port Security Features·······································································································19-7
Configuring NTK ····························································································································19-7
Configuring Intrusion Protection ····································································································19-8
Configuring Trapping ·····················································································································19-8
Configuring Secure MAC Addresses ····································································································19-8
Configuration Prerequisites ···········································································································19-9
Configuration Procedure················································································································19-9
Ignoring the Authorization Information from the Server ········································································19-9
Displaying and Maintaining Port Security ···························································································19-10
Port Security Configuration Examples ································································································19-10
Port Security Configuration for autoLearn Mode·········································································19-10
Port Security Configuration for userLoginWithOUI Mode····························································19-12
Port Security Configuration for macAddressElseUserLoginSecure Mode ··································19-16
Troubleshooting Port Security·············································································································19-18
Cannot Set the Port Security Mode·····························································································19-18
Cannot Configure Secure MAC Addresses·················································································19-18
Cannot Change Port Security Mode When a User Is Online ······················································19-19
20 MSTP Configuration ······························································································································20-1
MSTP Overview ····································································································································20-1
Introduction to STP························································································································20-1
Introduction to MSTP·····················································································································20-9
Protocols and Standards ·············································································································20-14
Configuration Task List ·······················································································································20-15
Configuring the Root Bridge················································································································20-16
Configuring an MST Region ········································································································20-16
Specifying the Root Bridge or a Secondary Root Bridge ····························································20-17
Configuring the Work Mode of MSTP Device ·············································································20-19
Configuring the Priority of the Current Device·············································································20-19
Configuring the Maximum Hops of an MST Region····································································20-20
Configuring the Network Diameter of a Switched Network ·························································20-21
Configuring Timers of MSTP ·······································································································20-21
Configuring the Timeout Factor···································································································20-23
Configuring the Maximum Transmission Rate of Ports·······························································20-23
Configuring Ports as Edge Ports ·································································································20-24
Configuring Whether Ports Connect to Point-to-Point Links ·······················································20-25
Configuring the Mode a Port Uses to Recognize/Send MSTP Packets······································20-26