Edge-Core ECS3510-28T Management Manual page 383

Edge-core 28/52-port fast ethernet layer 2 switch
Table of Contents

Advertisement

C
802.1X P
ONFIGURING
The maximum address count is effective when port security is enabled
or disabled.
Current MAC Count – The number of MAC addresses currently
associated with this interface.
MAC Filter – Shows if MAC address filtering has been set under
Security > Network Access (Configure MAC Filter) as described on
page
334.
MAC Filter ID – The identifier for a MAC address filter.
Last Intrusion MAC – The last unauthorized MAC address detected.
Last Time Detected Intrusion MAC – The last time an unauthorized
MAC address was detected.
W
I
EB
NTERFACE
To configure port security:
Click Security, Port Security.
1.
Mark the check box in the Security Status column to enable security,
2.
set the action to take when an invalid address is detected on a port,
and set the maximum number of MAC addresses allowed on the port.
Click Apply
3.
Figure 209: Configuring Port Security
A
ORT
UTHENTICATION
Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
The IEEE 802.1X (dot1X) standard defines a port-based access control
procedure that prevents unauthorized access to a network by requiring
users to first submit credentials for authentication. Access to all switch
ports in a network can be centrally controlled from a server, which means
– 383 –
| Security Measures
C
13
HAPTER
Configuring 802.1X Port Authentication

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ecs3510-52t

Table of Contents