Configuring 802.1X Port Authentication; Figure 186: Configuring Port Security - LevelOne GEL-1061 User Manual

Managed gigabit switch
Table of Contents

Advertisement

Configuring 802.1X Port Authentication

Current MAC Count – The number of MAC addresses currently associated with
this interface.
MAC Filter – Shows if MAC address filtering has been set under Security >
Network Access (Configure MAC Filter) as described on
MAC Filter ID – The identifier for a MAC address filter.
Last Intrusion MAC – The last unauthorized MAC address detected.
Last Time Detected Intrusion MAC – The last time an unauthorized MAC
address was detected.
Web Interface
To configure port security:
1.
Click Security, Port Security.
2.
Mark the check box in the Security Status column to enable security, set the
action to take when an invalid address is detected on a port, and set the
maximum number of MAC addresses allowed on the port.
3.
Click Apply

Figure 186: Configuring Port Security

Network switches can provide open and easy access to network resources by
simply attaching a client PC. Although this automatic configuration and access is a
desirable feature, it also allows unauthorized personnel to easily intrude and
possibly gain access to sensitive network data.
The IEEE 802.1X (dot1X) standard defines a port-based access control procedure
that prevents unauthorized access to a network by requiring users to first submit
credentials for authentication. Access to all switch ports in a network can be
centrally controlled from a server, which means that authorized users can use the
same credentials for authentication from any point within the network.
Configuring 802.1X Port Authentication
– 291 –
Chapter 12
| Security Measures
page
248.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Gep-1061Gel-2861

Table of Contents