Configuring 802.1X Port Authentication; Figure 3-38. Configuring Port Security - SMC Networks 6152L2 - annexe 1 Management Manual

Tigerswitch 10/100 48-port 10/100 mbps fast ethernet managed switch
Hide thumbs Also See for 6152L2 - annexe 1:
Table of Contents

Advertisement

C
ONFIGURING THE
Web – Click Security, Port Security. Set the action to take when an invalid
address is detected on a port, set the maximum number of MAC addresses
allowed on a port, and click Apply.
CLI – This example sets the command mode to Port 5, sets the port
security action to send a trap and disable the port, and then enables port
security for the switch.
Console(config)#interface ethernet 1/5
Console(config-if)#port security action trap-and-shutdown
Console(config-if)#port security
Console(config-if)#

Configuring 802.1X Port Authentication

Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
The IEEE 802.1X (dot1x) standard defines a port-based access control
procedure that prevents unauthorized access to a network by requiring
users to first submit credentials for authentication.
3-88
S
WITCH

Figure 3-38. Configuring Port Security

4-102

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 6152L2 - annexe 1 and is the answer not in the manual?

This manual is also suitable for:

Tigerswitch smc6152l2

Table of Contents