Configuring 802.1X Port Authentication; Figure 3-49 Configuring Port Security - Edge-Core ES3510 Management Manual

Edge-core es3510 10-port fast ethernet switch
Hide thumbs Also See for ES3510:
Table of Contents

Advertisement

3
Configuring the Switch
Web – Click Security, Port Security. Set the action to take when an invalid address is
detected on a port, mark the checkbox in the Status column to enable security for a
port, set the maximum number of MAC addresses allowed on a port, and click Apply.
CLI – This example selects the target port, sets the port security action to send a
trap and disable the port and sets the maximum MAC addresses allowed on the
port, and then enables port security for the port.
Console(config)#interface ethernet 1/5
Console(config-if)#port security action trap-and-shutdown
Console(config-if)#port security max-mac-count 20
Console(config-if)#port security
Console(config-if)#

Configuring 802.1X Port Authentication

Network switches can provide open and easy access to network resources by
simply attaching a client PC. Although this automatic configuration and access is a
desirable feature, it also allows unauthorized personnel to easily intrude and
possibly gain access to sensitive network data.
The IEEE 802.1X (dot1X) standard defines a port-based access control procedure
that prevents unauthorized access to a network by requiring users to first submit
credentials for authentication. Access to all switch ports in a network can be
centrally controlled from a server, which means that authorized users can use the
same credentials for authentication from any point within the network.
3-72

Figure 3-49 Configuring Port Security

4-98
4-98
4-98

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents