![](/images/backgrounds/285757/hp-procurve-2600-series-users-manual-550038246x1.png)
Configuring and Monitoring Port Security
Port Security Command Options and Operation
To remove a device (MAC address) from the “Authorized” list and when the current number of devices equals the Address Limit value, you should first reduce the Address Limit value by 1, then remove the unwanted device.
Note | When you have configured the switch for |
| reduce the address limit below the number of currently authorized addresses |
| on a port. This enables you to subsequently remove a device from the “Autho- |
| rized” list without opening the possibility for an unwanted device to automat- |
| ically become authorized. (If you use |
| switch cannot automatically add detected devices not included in the mac- |
| address configuration. Refer to the Note on page |
| For example, suppose port A1 is configured as shown below and you want to |
| |
| remove |
When removing
reduce the Address Limit by 1 to prevent the port from automatically adding another device that it detects on the network.
The following command serves this purpose by removing
ProCurve(config)#
The above command sequence results in the following configuration for port A1: