Figure 423 Displaying port state
If you remove MAC addresses from the secure MAC address list, the port can continue to learn MAC addresses.
Advanced port security mode configuration example
Network requirements
As shown in Figure 424, the switch authenticates the client with a RADIUS server. If the authentication succeeds, the client is authorized to access the Internet.
•The RADIUS server at 192.168.1.2 functions as the primary authentication server and the secondary accounting server, and the RADIUS server at 192.168.1.3 functions as the secondary authentication server and the primary accounting server. The shared key for authentication is name, and the shared key for accounting is money.
•All users use the default authentication, authorization, and accounting methods of ISP domain system.
•The switch sends usernames without domain names to the RADIUS server.
Configure port GigabitEthernet 1/0/1 of the switch to perform the following operations:
•Allow only one 802.1X user to be authenticated.
•Allow up to three OUI values to be configured, and allow one terminal that uses any of the OUI values to access the port.
Figure 424 Network diagram
433