Defining 802.1X - Cisco ESW 500 Administration Manual

Cisco systems switch user manual
Hide thumbs Also See for ESW 500:
Table of Contents

Advertisement

Configuring Device Security
Defining 802. 1 x
STEP 3
STEP 4

Defining 802.1x

ESW 500 Series Switches Administration Guide
maximum addresses allowed on the port. Both relearning and aging
MAC addresses are enabled. Previously learned MAC addresses are not
deleted but are converted to a static MAC address.
Max Entries — Specifies the number of MAC addresses that can be learned on
the port. The Max Entries field is enabled only if Locked is selected in the
Interface Status field. In addition, the Limited Dynamic Lock mode is selected.
The possible range is 1-128. The default is 1.
Action on Violation — Indicates the action to be applied to packets arriving on a
locked port. The possible field values are:
-
Discard
— Discards packets from any unlearned source. This is the
default value.
-
Forward
— Forwards packets from an unknown source without learning
the MAC address.
-
Shutdown
— Discards packets from any unlearned source and shuts
down the port. The port remains shut down until reactivated, or until the
device is reset.
Enable Trap — Enables traps when a packet is received on a locked port. The
possible field values are:
-
Checked
— Enables traps.
-
Unchecked
Trap Frequency — Displays the amount of time (in seconds) between traps.
The default value is 10 seconds.
Modify the relevant fields.
Click Apply. Port security is modified, and the device is updated.
Port based authentication enables authenticating system users on a per-port basis
via a external server. Only authenticated and approved system users can transmit
and receive data. Ports are authenticated via the RADIUS server using the
Extensible Authentication Protocol (EAP). Port Authentication includes:
— Disables traps.
5
135

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents