C
HAPTER
14
| Security Measures
Network Access (MAC Address Authentication)
– 300 –
4.
Mark the check box for any host addresses that need to be re-
authenticated, and click Re-authenticate.
Figure 160: Configuring Interface Settings for Web Authentication
N
ETWORK
A
CCESS
(MAC A
DDRESS
A
UTHENTICATION
)
Some devices connected to switch ports may not be able to support 802.1X
authentication due to hardware or software limitations. This is often true
for devices such as network printers, IP phones, and some wireless access
points. The switch enables network access from these devices to be
controlled by authenticating device MAC addresses with a central RADIUS
server.
N
OTE
:
RADIUS authentication must be activated and configured properly
for the MAC Address authentication feature to work properly. (See
"Configuring Remote Logon Authentication Servers" on page 282
.)
N
OTE
:
MAC authentication cannot be configured on trunk ports.
CLI R
EFERENCES
◆
"Network Access (MAC Address Authentication)" on page 750
C
OMMAND
U
SAGE
◆
MAC address authentication controls access to the network by
authenticating the MAC address of each host that attempts to connect
to a switch port. Traffic received from a specific MAC address is
forwarded by the switch only if the source MAC address is successfully
authenticated by a central RADIUS server. While authentication for a
MAC address is in progress, all traffic is blocked until authentication is
completed. On successful authentication, the RADIUS server may
optionally assign VLAN and quality of service settings for the switch
port.
◆
When enabled on a port, the authentication process sends a Password
Authentication Protocol (PAP) request to a configured RADIUS server.
The user name and password are both equal to the MAC address being
Summary of Contents for ECS4810-12M Layer 2
Page 1: ...Management Guide www edge core com ECS4810 12M Layer 2 Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 54: ...SECTION I Getting Started 54...
Page 64: ...CHAPTER 1 Introduction System Defaults 64...
Page 82: ...CHAPTER 2 Initial Switch Configuration Managing System Files 82...
Page 84: ...SECTION II Web Configuration 84...
Page 102: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 102...
Page 206: ...CHAPTER 6 VLAN Configuration Configuring VLAN Mirroring 206...
Page 256: ...CHAPTER 11 Class of Service Layer 3 4 Priority Settings 256...
Page 378: ...CHAPTER 14 Security Measures DHCP Snooping 378...
Page 520: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 520...
Page 528: ...CHAPTER 17 IP Services Displaying the DNS Cache 528...
Page 586: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 586...
Page 676: ...CHAPTER 22 SNMP Commands 676...
Page 684: ...CHAPTER 23 Remote Monitoring Commands 684...
Page 816: ...CHAPTER 27 Access Control Lists ACL Information 816...
Page 866: ...CHAPTER 30 Port Mirroring Commands RSPAN Mirroring Commands 866...
Page 884: ...CHAPTER 32 Automatic Traffic Control Commands 884...
Page 890: ...CHAPTER 33 Address Table Commands 890...
Page 986: ...CHAPTER 37 Class of Service Commands Priority Commands Layer 3 and 4 986...
Page 1006: ...CHAPTER 38 Quality of Service Commands 1006...
Page 1068: ...CHAPTER 39 Multicast Filtering Commands Multicast VLAN Registration 1068...
Page 1092: ...CHAPTER 40 LLDP Commands 1092...
Page 1134: ...CHAPTER 41 CFM Commands 1134...
Page 1154: ...CHAPTER 43 Domain Name Service Commands 1154...
Page 1160: ...CHAPTER 44 DHCP Commands DHCP Client 1160...
Page 1194: ...CHAPTER 45 IP Interface Commands IPv6 Interface 1194...
Page 1196: ...SECTION IV Appendices 1196...
Page 1202: ...APPENDIX A Software Specifications Management Information Bases 1202...
Page 1224: ...COMMAND LIST 1224...
Page 1234: ...INDEX 1234...
Page 1235: ......