Configuring 802.1X Port Authentication - Edge-Core ECS4110-28T Management Manual

28/52-port gigabit ethernet layer 2+ switch
Hide thumbs Also See for ECS4110-28T:
Table of Contents

Advertisement

C
802.1X P
ONFIGURING
Current MAC Count – The number of MAC addresses currently
associated with this interface.
MAC Filter – Shows if MAC address filtering has been set under
Security > Network Access (Configure MAC Filter) as described on
page
337.
MAC Filter ID – The identifier for a MAC address filter.
Last Intrusion MAC – The last unauthorized MAC address detected.
Last Time Detected Intrusion MAC – The last time an unauthorized
MAC address was detected.
W
I
EB
NTERFACE
To configure port security:
Click Security, Port Security.
1.
Mark the check box in the Security Status column to enable security,
2.
set the action to take when an invalid address is detected on a port,
and set the maximum number of MAC addresses allowed on the port.
Click Apply.
3.
Figure 208: Configuring Port Security
A
ORT
UTHENTICATION
Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
The IEEE 802.1X (dot1X) standard defines a port-based access control
procedure that prevents unauthorized access to a network by requiring
– 387 –
| Security Measures
C
13
HAPTER

Configuring 802.1X Port Authentication

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ecs4110-28pEcs4110-52tEcs4110-52p

Table of Contents