< Home

Application Scenarios for Port Security

Port security usually applies to the following scenarios:

Configuring Port Security at the Access Layer

In Figure 1, PC1 and PC3 connect to SwitchA through IP phones, and PC2 directly connects to SwitchA. To ensure security of the access switch and defend against attacks from unauthorized users, configure port security on the interface of SwitchA.

Figure 1 Configuring port security at the access layer
  • If access users frequently change location, you can configure port security to convert dynamic MAC addresses into dynamic secure MAC addresses. This ensures that bound MAC address entries are deleted immediately when users change location.
  • If access users seldom change location, you can configure port security to convert dynamic MAC addresses into sticky MAC addresses. This ensures that bound MAC address entries will not be lost after a device is reset.
  • If a few access users seldom change location, you can configure static secure MAC addresses.

Configuring Port Security at the Aggregation Layer

In Figure 2, multiple PCs communicate with the Switch (an aggregation switch) through SwitchA on a tree network. To ensure security of the aggregation switch and limit the number of access users, configure port security on the aggregation switch and set the maximum number of secure MAC addresses.

Figure 2 Configuring port security at the aggregation layer
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >