Configuring 802.1X Port Authentication; Figure 3-29 Configuring Port Security - SMC Networks SMC TigerStack IV SMC6224M Management Manual

Tigerstack 10/100 24/48-port 10/100mbps stackable managed switch
Hide thumbs Also See for SMC TigerStack IV SMC6224M:
Table of Contents

Advertisement

C
ONFIGURING THE
Web – Click Security, Port Security. Set the action to take when an invalid
address is detected on a port, mark the checkbox in the Status column to
enable security for a port, set the maximum number of MAC addresses
allowed on a port, and click Apply.
CLI – This example selects the target port, sets the port security action to
send a trap and disable the port and sets the maximum MAC addresses
allowed on the port, and then enables port security for the port.
Console(config)#interface ethernet 1/5
Console(config-if)#port security action trap-and-shutdown
Console(config-if)#port security max-mac-count 20
Console(config-if)#port security
Console(config-if)#

Configuring 802.1X Port Authentication

Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
The IEEE 802.1X (dot1X) standard defines a port-based access control
procedure that prevents unauthorized access to a network by requiring
users to first submit credentials for authentication. Access to all switch
ports in a network can be centrally controlled from a server, which means
that authorized users can use the same credentials for authentication from
any point within the network.
3-66
S
WITCH

Figure 3-29 Configuring Port Security

4-104

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SMC TigerStack IV SMC6224M and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Smc6248m6248m int - annexe 1

Table of Contents