Configuring Authentication Through Network Access Servers - AMX NXA-ENET8-2POE Operation/Reference Manual

Gigabit ethernet layer 2 poe switch
Hide thumbs Also See for NXA-ENET8-2POE:
Table of Contents

Advertisement

Port Limit Control Configuration parameters (Cont.)
Port Configuration (Cont.)
• Re-open
1.
Click Configuration, Security, Network, Limit Control.
2.
Set the system configuration parameters to globally enable or disable limit controls, and configure
address aging as required.
3.
Set limit controls for any port, including status, maximum number of addresses allowed, and the response
to a violation.
4.
Click Save.

Configuring Authentication Through Network Access Servers

Network switches can provide open and easy access to network resources by simply attaching a client PC.
Although this automatic configuration and access is a desirable feature, it also allows unauthorized personnel
to easily intrude and possibly gain access to sensitive network data.
Use the Network Access Server Configuration page to configure IEEE 802.1X port-based and MAC-based
authentication settings.
The 802.1X standard defines a port-based access control procedure that prevents unauthorized access to a
network by requiring users to first submit credentials for authentication.
FIG. 51
Network Access Server Configuration
NXA-ENET8-2POE Gigabit Ethernet Layer 2 PoE Switch
If a port is shut down by this module, you may reopen it by clicking this button,
which will only be enabled if this is the case. For other methods, refer to Shutdown
in the Action section. Note, that clicking the Reopen button causes the page to be
refreshed, so non-committed changes will be lost.
Configuring the NXA-ENET8-2POE
63

Advertisement

Table of Contents
loading

Table of Contents