Managing Ports
This field...
802.1x
Modifying Port Assignments
You can assign ports to different networks or purposes. Since modifying port assignments
often requires additional configurations, use the following table to determine which
procedure you should use.
Table 40: Modifying Port Assignments
To assign a port to...
No network
LAN
214
Displays...
The port's security scheme. This can be any of the following:
•
N/A. No security scheme is defined for the port.
•
Unauthorized. An 802.1x security scheme is defined for the
port. Users have not yet connected to the port and attempted
to authenticate, or a user failed to authenticate and no
Quarantine network is configured.
•
Authorized (network). An 802.1x security scheme is defined for
the port. A user connected to the port, authenticated
successfully, and was assigned to a network. The name of the
assigned network appears in parentheses.
•
Quarantine (network). An 802.1x security scheme is defined for
the port. A user connected to the port, failed to authenticate,
and was assigned to the Quarantine network. The name of
the Quarantine network appears in parentheses.
For information on configuring 802.1x port-based security, see Using
Port-Based Security on page 347.
See...
The procedure below. This disables the port.
The procedure below
Check Point UTM-1 Edge User Guide
Need help?
Do you have a question about the UTM-1 Edge and is the answer not in the manual?