C
HAPTER
14
| Security Measures
Network Access (MAC Address Authentication)
– 303 –
C
ONFIGURING
G
LOBAL
S
ETTINGS
FOR
N
ETWORK
A
CCESS
MAC address authentication is configured on a per-port basis, however
there are two configurable parameters that apply globally to all ports on
the switch. Use the Security > Network Access (Configure Global) page to
configure MAC address authentication aging and reauthentication time.
CLI R
EFERENCES
◆
"Network Access (MAC Address Authentication)" on page 750
P
ARAMETERS
These parameters are displayed:
◆
Aging Status
– Enables aging for authenticated MAC addresses stored
in the secure MAC address table. (Default: Disabled)
This parameter applies to authenticated MAC addresses configured by
the MAC Address Authentication process described in this section, as
well as to any secure MAC addresses authenticated by 802.1X,
regardless of the 802.1X Operation Mode (Single-Host, Multi-Host, or
MAC-Based authentication as described on
page 356
).
Authenticated MAC addresses are stored as dynamic entries in the
switch’s secure MAC address table and are removed when the aging
time expires.
The maximum number of secure MAC addresses supported for the
switch system is 1024.
◆
Reauthentication Time
– Sets the time period after which a
connected host must be reauthenticated. When the reauthentication
time expires for a secure MAC address, it is reauthenticated with the
RADIUS server. During the reauthentication process traffic through the
port remains unaffected. (Range: 120-1000000 seconds;
Default: 1800 seconds)
W
EB
I
NTERFACE
To configure aging status and reauthentication time for MAC address
authentication:
1.
Click Security, Network Access.
2.
Select Configure Global from the Step list.
3.
Enable or disable aging for secure addresses, and modify the
reauthentication time as required.
4.
Click Apply.
Summary of Contents for ECS4810-12M Layer 2
Page 1: ...Management Guide www edge core com ECS4810 12M Layer 2 Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 54: ...SECTION I Getting Started 54...
Page 64: ...CHAPTER 1 Introduction System Defaults 64...
Page 82: ...CHAPTER 2 Initial Switch Configuration Managing System Files 82...
Page 84: ...SECTION II Web Configuration 84...
Page 102: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 102...
Page 206: ...CHAPTER 6 VLAN Configuration Configuring VLAN Mirroring 206...
Page 256: ...CHAPTER 11 Class of Service Layer 3 4 Priority Settings 256...
Page 378: ...CHAPTER 14 Security Measures DHCP Snooping 378...
Page 520: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 520...
Page 528: ...CHAPTER 17 IP Services Displaying the DNS Cache 528...
Page 586: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 586...
Page 676: ...CHAPTER 22 SNMP Commands 676...
Page 684: ...CHAPTER 23 Remote Monitoring Commands 684...
Page 816: ...CHAPTER 27 Access Control Lists ACL Information 816...
Page 866: ...CHAPTER 30 Port Mirroring Commands RSPAN Mirroring Commands 866...
Page 884: ...CHAPTER 32 Automatic Traffic Control Commands 884...
Page 890: ...CHAPTER 33 Address Table Commands 890...
Page 986: ...CHAPTER 37 Class of Service Commands Priority Commands Layer 3 and 4 986...
Page 1006: ...CHAPTER 38 Quality of Service Commands 1006...
Page 1068: ...CHAPTER 39 Multicast Filtering Commands Multicast VLAN Registration 1068...
Page 1092: ...CHAPTER 40 LLDP Commands 1092...
Page 1134: ...CHAPTER 41 CFM Commands 1134...
Page 1154: ...CHAPTER 43 Domain Name Service Commands 1154...
Page 1160: ...CHAPTER 44 DHCP Commands DHCP Client 1160...
Page 1194: ...CHAPTER 45 IP Interface Commands IPv6 Interface 1194...
Page 1196: ...SECTION IV Appendices 1196...
Page 1202: ...APPENDIX A Software Specifications Management Information Bases 1202...
Page 1224: ...COMMAND LIST 1224...
Page 1234: ...INDEX 1234...
Page 1235: ......