Configuring 802.1X Port Authentication; Figure 3-38 Configuring Port Security - SMC Networks SMC8126L2 Management Manual

Tigerswitch 10/100/1000 26/50-port gigabit managed switch
Hide thumbs Also See for SMC8126L2:
Table of Contents

Advertisement

3
Configuring the Switch
Web – Click Security, Port Security. Set the action to take when an invalid address is
detected on a port, mark the checkbox in the Status column to enable security for a
port, set the maximum number of MAC addresses allowed on a port, and click Apply.
CLI – This example selects the target port, sets the port security action to send a
trap and disable the port and sets the maximum MAC addresses allowed on the
port, and then enables port security for the port.
Console(config)#interface ethernet 1/5
Console(config-if)#port security action trap-and-shutdown
Console(config-if)#port security max-mac-count 20
Console(config-if)#port security
Console(config-if)#

Configuring 802.1X Port Authentication

Network switches can provide open and easy access to network resources by
simply attaching a client PC. Although this automatic configuration and access is a
desirable feature, it also allows unauthorized personnel to easily intrude and
possibly gain access to sensitive network data.
The IEEE 802.1X (dot1X) standard defines a port-based access control procedure
that prevents unauthorized access to a network by requiring users to first submit
credentials for authentication. Access to all switch ports in a network can be
centrally controlled from a server, which means that authorized users can use the
same credentials for authentication from any point within the network.
3-60

Figure 3-38 Configuring Port Security

4-79
4-79
4-79

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Smc8150l28126l28150l2

Table of Contents