53
Chapter 5: Configuring Device Security
Defining Access Control
SFE1000P Gigabit Ethernet Switch Reference Guide
Chapter
5
•
Authentication Method
— Displays the method by which the last session was authenticated.
The possible field values are:
–
Remote
— 802.1x authentication is not used on this port (port is forced-authorized).
–
None
— The supplicant was not authenticated.
–
RADIUS
— The supplicant was authenticated by a RADIUS server.
•
MAC Address
— Displays the supplicant MAC address.
Defining Access Control
Access Control Lists (ACL) allow network managers to define classification actions and rules for
specific ingress ports. Your switch supports up to 256 ACLs. Packets entering an ingress port, with
an active ACL, are either admitted or denied entry. If they are denied entry, the user can disable the
port. ACLs are composed of access control entries (ACEs) that are made of the filters that determine
traffic classifications. The total number of ACEs that can be defined in all ACLs together is 256.
The Access Control section contains the following pages:
• Defining MAC Based ACL
• Defining IP Based ACL
• Defining ACL Binding
Defining MAC Based ACL
The
MAC Based ACL Page
page allows a MAC-based Access Control List (ACL) to be defined. The
table lists Access Control Elements (ACE) rules, which can be added only if the ACL is not bound to
an interface.