Configuring Port Security - Dell PowerConnect 5424 User Manual

Powerconnect 5400 series
Hide thumbs Also See for PowerConnect 5424:
Table of Contents

Advertisement

Displaying the Authenticated Users Table
1 Open the Add User Name page.
2 Click Show All.
The Authenticated Users Table opens:
Figure 7-6. Authenticated Users Table
Authenticating Users Using the CLI Commands
The following table summarizes the equivalent CLI commands for authenticating users as displayed in
the Add User Name page.
Table 7-3. Add User Name CLI Commands
CLI Command
show dot1x users [username
username]
The following is an example of the CLI commands:
console# show dot1x users
Username
--------
Bob
John

Configuring Port Security

Network security can be increased by limiting access on a specific port only to users with specific MAC
addresses. The MAC addresses can be dynamically learned, up to that point, or they can be statically
configured. Locked port security monitors both received and learned packets that are received on specific
ports. Access to the locked port is limited to users with specific MAC addresses. These addresses are
either manually defined on the port, or learned on that port up to the point when it is locked. When a
252
Configuring Device Information
Description
Displays 802.1X users for the device.
Session
Last
Time
Auth
--------
-----
1d3h
58m
8h19m
2m
Auth
MAC Address
Method
-------- -----------------
Remote
00:08:3b:79:87:87
None
00:08:3b:89:31:27
Interface
--------
g1
g2

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Powerconnect 5448

Table of Contents