Configuring Device Security
Defining Access Control
Cisco Small Business SFE/SGE Managed Switches Administration Guide
92
4
•
Authentication Method — Displays the method by which the last session was
authenticated. The possible field values are:
-
Remote
— Indicates the 802.1x authentication is not used on this port
(port is forced-authorized).
-
None
— Indicates the supplicant was not authenticated.
-
RADIUS
— Indicates the supplicant was authenticated by a RADIUS
server.
•
MAC Address — Displays the supplicant MAC address.
STEP 2
Modify the relevant fields.
STEP 3
Click Apply. The settings are defined, and the device is updated.
Defining Access Control
Access Control Lists
(ACL) allow network managers to define classification
actions and rules for specific ingress ports. Your switch supports up to 256 ACLs.
Packets entering an ingress port, with an active ACL, are either admitted or denied
entry. If they are denied entry, the user can disable the port. ACLs are composed
of
Access Control Entries
(ACEs) that are made of the filters that determine traffic
classifications. The total number of ACEs that can be defined in all ACLs together
is 256.
The Access Control section contains the following topics:
•
Defining MAC Based ACL
•
Defining IP Based ACL
•
Defining IPv6 Based ACLs
•
Defining ACL Binding
Defining MAC Based ACL
The
MAC Based ACL Page
allows a MAC-based
Access Control List
(ACL) to be
defined. The table lists
Access Control Elements
(ACE) rules, which can be added
only if the ACL is not bound to an interface.