HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 101

Configuring port security features, Configuring NTK

Page 101 highlights

• Do not enable 802.1X authentication or MAC authentication on a port where port security is configured. To enable a port security mode: Step 1. Enter system view. 2. (Optional.) Set an OUI value for user authentication. 3. Enter interface view. 4. Set the port security mode. Command Remarks system-view N/A port-security oui index index-value mac-address oui-value interface interface-type interface-number By default, no OUI value is configured for user authentication. This command is required for the userlogin-withoui mode. You can set multiple OUIs, but when the port security mode is userlogin-withoui, the port allows one 802.1X user and only one user that matches one of the specified OUIs. • To specify the autoLearn mode, you must enter Ethernet interface view. • To specify the userLoginWithOUI mode, you must enter Ethernet interface view or WLAN-ESS interface view. port-security port-mode { autolearn | mac-authentication | mac-else-userlogin-secure | mac-else-userlogin-secure-ext | secure | userlogin | userlogin-secure | userlogin-secure-ext | userlogin-secure-or-mac | userlogin-secure-or-mac-ext | userlogin-withoui } By default, a port operates in noRestriction mode. After enabling port security, you can change the port security mode of a port only when the port is operating in noRestriction (the default) mode. To change the port security mode for a port in any other mode, first use the undo port-security port-mode command to restore the default port security mode. Configuring port security features Configuring NTK The NTK feature checks the destination MAC addresses in outbound frames to make sure frames are forwarded only to authenticated devices. The NTK feature supports the following modes: • ntkonly-Forwards only unicast frames with authenticated destination MAC addresses. • ntk-withbroadcasts-Forwards only broadcast frames and unicast frames with authenticated destination MAC addresses. 92

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

92
Do not enable 802.1X authentication or MAC authentication on a port where port security is
configured.
To enable a port security mode:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
(Optional.) Set an OUI value
for user authentication.
port-security oui index
index-value
mac-address
oui-value
By default, no OUI value is
configured for user authentication.
This command is required for the
userlogin-withoui
mode.
You can set multiple OUIs, but
when the port security mode is
userlogin-withoui
, the port allows
one 802.1X user and only one user
that matches one of the specified
OUIs.
3.
Enter interface view.
interface
interface-type
interface-number
To specify the autoLearn mode,
you must enter Ethernet
interface view.
To specify the
userLoginWithOUI mode, you
must enter Ethernet interface
view or WLAN-ESS interface
view.
4.
Set the port security mode.
port-security
port-mode
{
autolearn
|
mac-authentication
|
mac-else-userlogin-secure
|
mac-else-userlogin-secure-ext
|
secure
|
userlogin
|
userlogin-secure
|
userlogin-secure-ext
|
userlogin-secure-or-mac
|
userlogin-secure-or-mac-ext
|
userlogin-withoui
}
By default, a port operates in
noRestriction mode.
After enabling port security, you
can change the port security mode
of a port only when the port is
operating in noRestriction (the
default) mode. To change the port
security mode for a port in any
other mode, first use the
undo
port-security port-mode
command
to restore the default port security
mode.
Configuring port security features
Configuring NTK
The NTK feature checks the destination MAC addresses in outbound frames to make sure frames are
forwarded only to authenticated devices.
The NTK feature supports the following modes:
ntkonly
—Forwards only unicast frames with authenticated destination MAC addresses.
ntk-withbroadcasts
—Forwards only broadcast frames and unicast frames with authenticated
destination MAC addresses.