C
ONFIGURING THE
Web – Click Security, Port Security. Set the action to take when an invalid
address is detected on a port, set the maximum number of MAC addresses
allowed on a port, and click Apply.
CLI – This example sets the command mode to Port 5, sets the port
security action to send a trap and disable the port, and then enables port
security for the switch.
Console(config)#interface ethernet 1/5
Console(config-if)#port security action trap-and-shutdown
Console(config-if)#port security
Console(config-if)#
Configuring 802.1X Port Authentication
Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
The IEEE 802.1X (dot1x) standard defines a port-based access control
procedure that prevents unauthorized access to a network by requiring
users to first submit credentials for authentication.
3-88
S
WITCH
Figure 3-38. Configuring Port Security
4-102
Need help?
Do you have a question about the 6152L2 - annexe 1 and is the answer not in the manual?