C
HAPTER
13
| Security Measures
Configuring 802.1X Port Authentication
– 395 –
◆
Re-authentication Period
– Sets the time period after which a
connected client must be re-authenticated. (Range: 1-65535 seconds;
Default: 3600 seconds)
◆
Re-authentication Max Retries
– The maximum number of times the
switch port will retransmit an EAP request/identity packet to the client
before it times out the authentication session. (Range: 1-10;
Default: 2)
◆
Intrusion Action
– Sets the port’s response to a failed authentication.
■
Block Traffic
– Blocks all non-EAP traffic on the port. (This is the
default setting.)
■
Guest VLAN
– All traffic for the port is assigned to a guest VLAN.
The guest VLAN must be separately configured (See
"Configuring
VLAN Groups" on page 200
) and mapped on each port (See
"Configuring Network Access for Ports" on page 337
).
Supplicant List
◆
Supplicant
– MAC address of authorized client.
Authenticator PAE State Machine
◆
State
– Current state (including initialize, disconnected, connecting,
authenticating, authenticated, aborting, held, force_authorized,
force_unauthorized).
◆
Reauth Count
– Number of times connecting state is re-entered.
◆
Current Identifier
– Identifier sent in each EAP Success, Failure or
Request packet by the Authentication Server.
Backend State Machine
◆
State
– Current state (including request, response, success, fail,
timeout, idle, initialize).
◆
Request Count
– Number of EAP Request packets sent to the
Supplicant without receiving a response.
◆
Identifier (Server)
– Identifier carried in the most recent EAP
Success, Failure or Request packet received from the Authentication
Server.
Reauthentication State Machine
◆
State
– Current state (including initialize, reauthenticate).
Summary of Contents for ECS3510-10PD
Page 1: ...Management Guide www edge core com 10 Port Layer 2 Fast Ethernet Switch...
Page 2: ......
Page 4: ......
Page 48: ...CONTENTS 48...
Page 68: ...SECTION I Getting Started 68...
Page 78: ...CHAPTER 1 Introduction System Defaults 78...
Page 96: ...CHAPTER 2 Initial Switch Configuration Managing System Files 96...
Page 98: ...SECTION II Web Configuration 98...
Page 118: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 118...
Page 150: ...CHAPTER 4 Basic Management Tasks Resetting the System 150...
Page 196: ...CHAPTER 5 Interface Configuration VLAN Trunking 196 Figure 66 Configuring VLAN Trunking...
Page 238: ...CHAPTER 7 Address Table Settings Configuring MAC Address Mirroring 238...
Page 264: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 264...
Page 274: ...CHAPTER 9 Congestion Control Automatic Traffic Control 274...
Page 288: ...CHAPTER 10 Class of Service Layer 3 4 Priority Settings 288...
Page 304: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 304...
Page 424: ...CHAPTER 13 Security Measures DHCP Snooping 424...
Page 568: ...CHAPTER 14 Basic Administration Protocols OAM Configuration 568...
Page 596: ...CHAPTER 15 IP Configuration Setting the Switch s IP Address IP Version 6 596...
Page 614: ...CHAPTER 1 IP Services Configuring the PPPoE Intermediate Agent 614...
Page 784: ...CHAPTER 20 System Management Commands Powered Device 784...
Page 814: ...CHAPTER 22 Remote Monitoring Commands 814...
Page 1008: ...CHAPTER 26 Interface Commands Power Savings 1008...
Page 1022: ...CHAPTER 27 Link Aggregation Commands Trunk Status Display Commands 1022...
Page 1052: ...CHAPTER 29 Congestion Control Commands Automatic Traffic Control Commands 1052...
Page 1064: ...CHAPTER 31 UniDirectional Link Detection Commands 1064...
Page 1070: ...CHAPTER 32 Address Table Commands 1070...
Page 1130: ...CHAPTER 34 ERPS Commands 1130...
Page 1172: ...CHAPTER 35 VLAN Commands Configuring Voice VLANs 1172...
Page 1186: ...CHAPTER 36 Class of Service Commands Priority Commands Layer 3 and 4 1186...
Page 1302: ...CHAPTER 38 Multicast Filtering Commands MVR for IPv6 1302...
Page 1368: ...CHAPTER 40 CFM Commands Delay Measure Operations 1368...
Page 1390: ...CHAPTER 42 Domain Name Service Commands 1390...
Page 1448: ...CHAPTER 44 IP Interface Commands ND Snooping 1448...
Page 1450: ...SECTION IV Appendices 1450...
Page 1455: ...APPENDIX A Software Specifications Management Information Bases 1455 UDP MIB RFC 2013...
Page 1456: ...APPENDIX A Software Specifications Management Information Bases 1456...
Page 1482: ...COMMAND LIST 1482...
Page 1493: ......