![](/images/backgrounds/291895/hp-1920-16g-switch-users-manual-157638439x1.png)
The page for applying port security control appears.
Figure 412 Configuring basic port security control
3.Configure basic port security control settings as described in Table 129.
4.Click Apply.
Table 129 Configuration items
Item | Description |
| Selects a port where you want to configure port security. |
Port | By default, port security is disabled on all ports, and access to the ports is not |
| restricted. |
|
|
| Sets the maximum number of secure MAC addresses on the port. |
| The number of authenticated users on the port cannot exceed the specified upper |
| limit. |
| You can set the maximum number of MAC addresses that port security allows on |
| a port for the following purposes: |
Max Number of MAC | • Control the maximum number of concurrent users on the port. |
| • Control the number of secure MAC addresses that can be added with port |
| security. |
| NOTE: |
| The port security's limit on the maximum number of MAC addresses on a port is |
| independent of the MAC learning limit in MAC address table management. |
| Specifies whether to enable intrusion protection, and selects an action to be |
| taken on illegal frames. |
| Available actions: |
| • Disable Port |
| can be configured in the global settings. For more information, see |
| |
Enable Intrusion Protection | • Disable Port |
| illegal frame received on the port. The port does not come up unless you bring |
| it up manually. |
| • Block |
| MAC addresses list and discards the frames. All subsequent frames sourced |
| from a blocked MAC address will be dropped. A blocked MAC address is |
| restored to normal state after being blocked for 3 minutes. The interval is not |
| user configurable. |
|
|
426