Configuring 802.1X - Cisco 200 Series Administration Manual

Hide thumbs Also See for 200 Series:
Table of Contents

Advertisement

Configuring Security
Configuring 802. 1 X
STEP 4

Configuring 802.1X

Cisco Small Business 200 Series Smart Switch Administration Guide
Max No. of Addresses Allowed—Enter the maximum number of MAC
addresses that can be learned on the port if Limited Dynamic Lock learning
mode is selected. The range is 0-256 and the default is 1. The number 0
indicates that only static addresses are supported on the interface.
Action on Violation—Select an action to be applied to packets arriving on a
locked port. The options are:
-
Discard—Discards packets from any unlearned source.
-
Forward—Forwards packets from an unknown source without learning
the MAC address.
-
Shutdown—Discards packets from any unlearned source, and shuts
down the port. The port remains shut down until reactivated, or until the
switch is rebooted.
Trap—Select to enable traps when a packet is received on a locked port.
This is relevant for lock violations. For Classic Lock, this is any new address
received. For Limited Dynamic Lock, this is any new address that exceeds
the number of allowed addresses.
Traps on the 200 Series are syslog related and not through SNMP. The
NOTE
200 Series does not support SNMP.
Trap Frequency—Enter minimum time (in seconds) that elapses between
traps.
Click Apply. Port security is modified, and the switch is updated.
Port-based access control has the effect of creating two types of access on the
switch ports. One point of access enables uncontrolled communication,
regardless of the authorization state (uncontrolled port). The other point of access
authorizes communication between the host and the switch.
The 802. 1 x is an IEEE standard for port based network access control. The 802. 1 x
framework enables a device (the supplicant) to request port access from a remote
device (authenticator) to which it is connected. Only when the supplicant
requesting port access is authenticated and authorized is the supplicant
permitted to send data to the port. Otherwise, the authenticator discards the
supplicant data.
16
184

Advertisement

Table of Contents
loading

Table of Contents