Configuring 802.1X Port Authentication - Edge-Core ECS4810-12M Layer 2 Management Manual

Hide thumbs Also See for ECS4810-12M Layer 2:
Table of Contents

Advertisement

| Security Measures
C
13
HAPTER

Configuring 802.1X Port Authentication

C
802.1X P
ONFIGURING
The maximum address count is effective when port security is enabled
or disabled.
Current MAC Count – The number of MAC addresses currently
associated with this interface.
MAC Filter – Shows if MAC address filtering has been set under
Security > Network Access (Configure MAC Filter) as described on
page
341.
MAC Filter ID – The identifier for a MAC address filter.
Last Intrusion MAC – The last unauthorized MAC address detected.
Last Time Detected Intrusion MAC – The last time an unauthorized
MAC address was detected.
W
I
EB
NTERFACE
To configure port security:
Click Security, Port Security.
1.
Mark the check box in the Security Status column to enable security,
2.
set the action to take when an invalid address is detected on a port,
and set the maximum number of MAC addresses allowed on the port.
Click Apply.
3.
Figure 213: Configuring Port Security
A
ORT
UTHENTICATION
Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
The IEEE 802.1X (dot1X) standard defines a port-based access control
procedure that prevents unauthorized access to a network by requiring
users to first submit credentials for authentication. Access to all switch
ports in a network can be centrally controlled from a server, which means
– 390 –

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ecs4810-12m

Table of Contents