Planet Networking & Communication WGSW-24010 User Manual page 225

10/100/1000mbps 24-port + 1 mini-gbic managed gigabit ethernet switch
Hide thumbs Also See for WGSW-24010:
Table of Contents

Advertisement

• User Name -- List of users authorized via the RADIUS Server.
• Port -- The port number(s) used for authentication - per user name.
• Session Time -- The amount of time the user was logged on to the device. The field format is
Day:Hour:Minute:Seconds, for example, 3 days: 2 hours: 4 minutes: 39 seconds.
• Last Authentication -- The amount of time that has passed since the user was last authenticated. The field
format is Day:Hour:Minute:Seconds, for example, 3 days:2 hours: 4 minutes: 39 seconds.
• Authentication Method -- The method by which the last session was authenticated. The possible field values
are:
ú Remote -- The user was authenticated from a remote server.
ú None -- The user was not authenticated.
ú MAC Address -- The client (supplicant) MAC address.
Port Security
Network security can be increased by limiting access on a specific port only to users with specific MAC addresses. The
MAC addresses can be dynamically learned, up to that point, or they can be statically configured. Locked port security
monitors both received and learned packets that are received on specific ports. Access to the locked port is limited to users
with specific MAC addresses. These addresses are either manually defined on the port, or learned on that port up to the
point when it is locked. When a packet is received on a locked port, and the packet □ source MAC address is not tied to
that port (either it was learned on a different port, or is unknown to the system), the protection mechanism is invoked, and
can provide various options. Unauthorized packets arriving to a locked port are either:
• Forwarded
• Discarded with no trap
• Discarded with a trap
• The ingress port is disabled
?
In order to enable port security, the Multiple Hosts feature must first be enabled on the required
Note
:
port(s).
Locked port security also enables storing a list of MAC addresses in the configuration file. The MAC address list can be
restored after the device has been reset.
Disabled ports are activated from the Port Parameters page, see "Port Configuration".
To open Port Security screen perform the folling:
1.
Click Switch -> Network Secuity -> Port Security
2.
The Port Security screen is displayed as in Figure 3-50.
217

Advertisement

Table of Contents
loading

Table of Contents