C
HAPTER
14
| Security Measures
Network Access (MAC Address Authentication)
– 304 –
Figure 161: Configuring Global Settings for Network Access
C
ONFIGURING
N
ETWORK
A
CCESS
FOR
P
ORTS
Use the Security > Network Access (Configure Interface - General) page to
configure MAC authentication on switch ports, including enabling address
authentication, setting the maximum MAC count, and enabling dynamic
VLAN or dynamic QoS assignments.
CLI R
EFERENCES
◆
"Network Access (MAC Address Authentication)" on page 750
P
ARAMETERS
These parameters are displayed:
◆
MAC Authentication
■
Status
– Enables MAC authentication on a port. (Default: Disabled)
■
Intrusion
– Sets the port response to a host MAC authentication
failure to either block access to the port or to pass traffic through.
(Options: Block, Pass; Default: Block)
■
Max MAC Count
5
– Sets the maximum number of MAC addresses
that can be authenticated on a port via MAC authentication; that is,
the Network Access process described in this section.
(Range: 1-1024; Default: 1024)
◆
Network Access Max MAC Count
5
– Sets the maximum number of
MAC addresses that can be authenticated on a port interface via all
forms of authentication (including Network Access and IEEE 802.1X).
(Range: 1-1024; Default: 1024)
◆
Guest VLAN
– Specifies the VLAN to be assigned to the port when
802.1X Authentication fails. (Range: 0-4093, where 0 means disabled;
Default: Disabled)
The VLAN must already be created and active (see
"Configuring VLAN
Groups" on page 178
). Also, when used with 802.1X authentication,
intrusion action must be set for “Guest VLAN” (see
"Configuring Port
Authenticator Settings for 802.1X" on page 356
).
5. The maximum number of MAC addresses per port is 1024, and the maximum number of
secure MAC addresses supported for the switch system is 1024. When the limit is
reached, all new MAC addresses are treated as authentication failures.
Summary of Contents for ECS4810-12M Layer 2
Page 1: ...Management Guide www edge core com ECS4810 12M Layer 2 Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 54: ...SECTION I Getting Started 54...
Page 64: ...CHAPTER 1 Introduction System Defaults 64...
Page 82: ...CHAPTER 2 Initial Switch Configuration Managing System Files 82...
Page 84: ...SECTION II Web Configuration 84...
Page 102: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 102...
Page 206: ...CHAPTER 6 VLAN Configuration Configuring VLAN Mirroring 206...
Page 256: ...CHAPTER 11 Class of Service Layer 3 4 Priority Settings 256...
Page 378: ...CHAPTER 14 Security Measures DHCP Snooping 378...
Page 520: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 520...
Page 528: ...CHAPTER 17 IP Services Displaying the DNS Cache 528...
Page 586: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 586...
Page 676: ...CHAPTER 22 SNMP Commands 676...
Page 684: ...CHAPTER 23 Remote Monitoring Commands 684...
Page 816: ...CHAPTER 27 Access Control Lists ACL Information 816...
Page 866: ...CHAPTER 30 Port Mirroring Commands RSPAN Mirroring Commands 866...
Page 884: ...CHAPTER 32 Automatic Traffic Control Commands 884...
Page 890: ...CHAPTER 33 Address Table Commands 890...
Page 986: ...CHAPTER 37 Class of Service Commands Priority Commands Layer 3 and 4 986...
Page 1006: ...CHAPTER 38 Quality of Service Commands 1006...
Page 1068: ...CHAPTER 39 Multicast Filtering Commands Multicast VLAN Registration 1068...
Page 1092: ...CHAPTER 40 LLDP Commands 1092...
Page 1134: ...CHAPTER 41 CFM Commands 1134...
Page 1154: ...CHAPTER 43 Domain Name Service Commands 1154...
Page 1160: ...CHAPTER 44 DHCP Commands DHCP Client 1160...
Page 1194: ...CHAPTER 45 IP Interface Commands IPv6 Interface 1194...
Page 1196: ...SECTION IV Appendices 1196...
Page 1202: ...APPENDIX A Software Specifications Management Information Bases 1202...
Page 1224: ...COMMAND LIST 1224...
Page 1234: ...INDEX 1234...
Page 1235: ......