3com S7906E インストール手順
i
Table of Contents
1 Port Security Configuration······················································································································1-1
Introduction to Port Security····················································································································1-1
Port Security Overview ····················································································································1-1
Port Security Features·····················································································································1-2
Port Security Modes ························································································································1-2
Port Security Configuration Task List······································································································1-5
Enabling Port Security·····························································································································1-5
Configuration Prerequisites ·············································································································1-5
Configuration Procedure··················································································································1-5
Setting the Port Security Mode ···············································································································1-6
Configuration Prerequisites ·············································································································1-6
Configuring Procedure·····················································································································1-7
Configuring Port Security Features·········································································································1-8
Configuring NTK ······························································································································1-8
Configuring Intrusion Protection ······································································································1-8
Configuring Trapping ·······················································································································1-9
Configuring Secure MAC Addresses ····································································································1-10
Configuration Prerequisites ···········································································································1-10
Configuration Procedure················································································································1-10
Ignoring Authorization Information from the Server ··············································································1-10
Displaying and Maintaining Port Security ·····························································································1-11
Port Security Configuration Examples ··································································································1-11
Configuring the autoLearn Mode···································································································1-11
Troubleshooting Port Security···············································································································1-21
Cannot Set the Port Security Mode·······························································································1-21