Network Access (Mac Address Authentication); Table 89: Network Access Commands - Edge-Core ECS3510-10PD Management Manual

10-port layer 2
Table of Contents

Advertisement

N
A
ETWORK
CCESS
Port Status
Intrusion Action
Max MAC Count
Current MAC Count
Last Intrusion MAC
Last Time Detected Intrusion MAC
Console#
This example shows information about a detected intrusion.
Console#show port security interface ethernet 1/2
Global Port Security Parameters
Secure MAC Aging Mode : Disabled
Port Security Details
Port
Port Security
Port Status
Intrusion Action
Max MAC Count
Current MAC Count
MAC Filter ID
Last Intrusion MAC
Last Time Detected Intrusion MAC
Console#
(MAC A
A
DDRESS
UTHENTICATION
Network Access authentication controls access to the network by
authenticating the MAC address of each host that attempts to connect to a
switch port. Traffic received from a specific MAC address is forwarded by
the switch only if the source MAC address is successfully authenticated by
a central RADIUS server. While authentication for a MAC address is in
progress, all traffic is blocked until authentication is completed. Once
successfully authenticated, the RADIUS server may optionally assign VLAN
and QoS settings for the switch port.

Table 89: Network Access Commands

Command
network-access aging
network-access mac-filter
mac-authentication
reauth-time
network-access dynamic-qos
network-access dynamic-vlan
network-access guest-vlan
network-access link-detection
network-access link-detection
link-down
C
HAPTER

Network Access (MAC Address Authentication)

: Secure/Up
: None
: 0
: 0
: NA
: NA
: 1/2
: Enabled
: Secure/Up
: None
: 0
: 0
: 2
: 00-10-22-00-00-01
: 2010/7/29 15:13:03
)
Function
Enables MAC address aging
Adds a MAC address to a filter table
Sets the time period after which a connected MAC
address must be re-authenticated
Enables the dynamic quality of service feature
Enables dynamic VLAN assignment from a RADIUS
server
Specifies the guest VLAN
Enables the link detection feature
Configures the link detection feature to detect and
act upon link-down events
– 885 –
| General Security Measures
24
Mode
GC
GC
GC
IC
IC
IC
IC
IC

Advertisement

Table of Contents
loading

Table of Contents