206 CHAPTER 25: P ORT SECURITY CONFIGURATIONDisplaying PortSecurity ConfigurationAfter the above configuration, you can use the display command in any view todisplay port security information and verify your configuration.Port SecurityConfigurationExamplePort SecurityConfiguration ExampleNetwork requirementsImplement access user restrictions through the following configuration onGigabitEthernet 2/0/1 of the switch.■ Allow a maximum of 80 users to access the port without authentication andpermit the port to learn and add the MAC addresses of the users as securityMAC addresses.■ To ensure that Host can access the network, add the MAC address0001-0002-0003 of Host as a security MAC address to the port in VLAN 1.■ After the number of security MAC addresses reaches 80, the port stopslearning MAC addresses. If any frame with an unknown MAC address arrives,intrusion protection is triggered and the port will be disabled and stay silent for30 seconds.Network diagramFigure 53 Network diagram for port security configurationConfiguration procedure# Enter system view. system-view# Enable port security.[SW7750] port-security enable# Enter GigabitEthernet 2/0/1 port view.[SW7750] interface GigabitEthernet 2/0/1Table 139 Display port security configurationOperation Command DescriptionDisplay information aboutport security configurationdisplay port-security [ interfaceinterface-list ]You canexecute thedisplaycommand inany view.Display information aboutsecurity MAC addressconfigurationdisplay mac-address security [ interfaceinterface-type interface-number ] [ vlanvlan-id ] [ count ]InternetSwitchHostGE2/0/1MAC:0001 -0002- 0003