Network Access (Mac Address Authentication); Table 47: Network Access Commands - Motorola EX-3524 Cli Reference Manual

Layer 2 gigabit ethernet poe/poe+ switch
Hide thumbs Also See for EX-3524:
Table of Contents

Advertisement

Chapter 8
| General Security Measures

Network Access (MAC Address Authentication)

Network Access (MAC Address Authentication)
Example
The following example enables port security for port 5, and sets the response to a
security violation to issue a trap message:
Console(config)#interface ethernet 1/5
Console(config-if)#port security action trap
Related Commands
show interfaces status (304)
shutdown (300)
mac-address-table static (362)
Network Access authentication controls access to the network by authenticating
the MAC address of each host that attempts to connect to a switch port. Traffic
received from a specific MAC address is forwarded by the switch only if the source
MAC address is successfully authenticated by a central RADIUS server. While
authentication for a MAC address is in progress, all traffic is blocked until
authentication is completed. Once successfully authenticated, the RADIUS server
may optionally assign VLAN and QoS settings for the switch port.

Table 47: Network Access Commands

Command
network-access aging
network-access mac-filter
mac-authentication reauth-time
network-access dynamic-qos
network-access dynamic-vlan
network-access guest-vlan
network-access link-detection
network-access link-detection
link-down
network-access link-detection
link-up
network-access link-detection
link-up-down
network-access max-mac-count
network-access mode
mac-authentication
network-access port-mac-filter
Function
Enables MAC address aging
Adds a MAC address to a filter table
Sets the time period after which a connected MAC
address must be re-authenticated
Enables the dynamic quality of service feature
Enables dynamic VLAN assignment from a RADIUS server IC
Specifies the guest VLAN
Enables the link detection feature
Configures the link detection feature to detect and act
upon link-down events
Configures the link detection feature to detect and act
upon link-up events
Configures the link detection feature to detect and act
upon both link-up and link-down events
Sets the maximum number of MAC addresses that can be
authenticated on a port via all forms of authentication
Enables MAC authentication on an interface
Enables the specified MAC address filter
– 222 –
Mode
GC
GC
GC
IC
IC
IC
IC
IC
IC
IC
IC
IC

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ex-3548

Table of Contents