Planet Networking & Communication WGSW-24010 User Manual page 224

10/100/1000mbps 24-port + 1 mini-gbic managed gigabit ethernet switch
Hide thumbs Also See for WGSW-24010:
Table of Contents

Advertisement

• Port -- The port number for which Advanced Port Based Authentication is enabled.
• Multiple Hosts -- Enables or disables a single host to authorize multiple hosts for system access. This setting
must be enabled in order to either disable the ingress-filter, or to use port-lock security on the selected port.
• Action on Single Host Violation -- Defines the action to be applied to packets arriving in single-host mode,
from a host whose MAC address is not the client (supplicant) MAC address. The Action on Single Host
Violation field can be defined only if the Multiple Hosts field is defined as Disable. The possible field values are:
• Permit -- Forwards the packets from an unknown source, however, the MAC address is not learned.
• Deny -- Discards the packets from any unlearned source. This is the default value.
• Shutdown -- Discards the packet from any unlearned source and locks the port. Ports remain locked until they
are activated, or the device is reset.
• Traps -- Enables or disables sending traps to the host if a violation occurs.
• Trap Frequency (1-1000000) (Sec) -- Defines the time period by which traps are sent to the host. The Trap
Frequency (1-1000000) field can be defined only if the Multiple Hosts field is defined as Disable. The default is
10 seconds.
• Status -- The host status. The possible field values are:
• Unauthorized -- Clents (supplicants) have full port access.
• Authorized -- Clents (supplicants) have limited port access.
• No single-host -- Multiple Hosts is enabled.
• Number of Violations -- The number of packets that arrived on the interface in single-host mode, from a host
whose MAC address is not the client (supplicant) MAC address.
Authentiated Users
The Authenticated Users page displays user port access lists.
To open Authenticated Users screen perform the folling:
1.
Click Switch -> Network Secuity -> Authenticated Users
2.
The Authenticated Users screen is displayed as in Figure 3-49.
The page includes the following fields:
Figure 3-49 Authenitcated Users screen
216

Advertisement

Table of Contents
loading

Table of Contents