Configuring Port-Based (802.1X) Access Control - Cisco ISA550 Administration Manual

Isa500 series integrated security appliances
Hide thumbs Also See for ISA550:
Table of Contents

Advertisement

Networking
Managing Ports
STEP 1
STEP 2
STEP 3
Cisco ISA500 Series Integrated Security Appliances Administration Guide
Click On to enable port mirroring, or click Off to disable this feature.
If you enable port mirroring, enter the following information:
TX Destination: Choose the port that monitors the transmitted traffic for
other ports.
TX Monitored Ports: Check the ports that are monitored. The port that you
set as a TX Destination port cannot be selected as a monitored port.
RX Destination: Choose the port that monitors the received traffic for other
ports.
RX Monitored Ports: Check the ports that are monitored. The port that you
set as a RX Destination port cannot be selected as a monitored port.
Click Save to apply your settings.

Configuring Port-Based (802.1x) Access Control

Use the Networking > Ports > Port-Based Access Control page to configure IEEE
802. 1 x port-based authentication, which prevents unauthorized devices
(802. 1 x-capable clients) from gaining access to the network.
The IEEE 802. 1 x standard defines a client-server-based access control and
authentication protocol that restricts unauthorized devices from connecting to a
VLAN through publicly accessible ports. The authentication server authenticates
each client (supplicant in Windows 2000, XP, Vista, Windows 7, and Mac OS)
connected to a port before making available any service offered by the security
appliance or the VLAN.
Until the client is authenticated, 802. 1 x access control allows only Extensible
Authentication Protocol over LAN (EAPOL) traffic through the port to which the
client is connected. After authentication is successful, normal traffic can pass
through the port.
This feature simplifies the security management by allowing you to control access
from a master database in a single server (although you can use up to three
RADIUS servers to provide backups in case access to the primary server fails). It
also means that user can enter the same authorized RADIUS username and
password pair for authentication, regardless of which switch is the access point
into the VLAN.
4
119

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Isa550wIsa570Isa570w

Table of Contents