6-4z Currently, port security supports two authentication methods: 802.1X and MAC authentication.Different port security modes employ different authentication methods or different combinations ofauthentication methods.z The maximum number of users a port supports is the lesser of the maximum number of secureMAC addresses or the maximum number of authenticated users the security mode supports. Forexample, in userLoginSecureExt mode, the maximum number of users a port supports is thelesser of the maximum number of secure MAC addresses configured or the maximum number ofusers that 802.1X supports.These security mode naming rules may help you remember the modes:z userLogin specifies port-based 802.1X authentication.z macAddress specifies MAC address authentication.z Else specifies that the authentication method before Else is applied first. If the authentication fails,the protocol type of the authentication request determines whether to turn to the authenticationmethod following the Else.z In a security mode with Or, the protocol type of the authentication request determines whichauthentication method is to be used. However, 802.1X authentication is preferred by wirelessusers.z userLogin with Secure specifies MAC-based 802.1X authentication.z Ext indicates allowing multiple 802.1X users to be authenticated and get online. A security modewithout Ext allows only one 802.1X user to be authenticated and get online.Port Security Configuration Task ListComplete the following tasks to configure port security:Task RemarksEnabling Port Security RequiredSetting the Maximum Number of Secure MAC Addresses OptionalSetting the Port Security Mode RequiredConfiguring NTKConfiguring Intrusion ProtectionConfiguring Port Security FeaturesConfiguring TrappingOptionalChoose one ormore features asrequired.Configuring Secure MAC Addresses OptionalIgnoring Authorization Information from the Server Optional