Table 294: Authentication Tiering Fields
Field
Description
Interface
The interface associated with the rest of the data in the row. When editing
information for one or more interfaces, this field identifies the interfaces that are
being configured.
Configured Order
The order in which the authentication methods are used to authenticate a client
connected to an interface, which can be one or more of the following:
•
Dot1x – The port-based authentication method.
•
MAB – MAC Authentication Bypass method that uses the MAC address of the
client to determine the kind of network access to provide.
•
Captive Portal – The authentication method that prevents clients from
accessing the network until user verification has been established.
Captive portal must always be the last method in the list.
Enabled Order
The methods from the list of authentication methods configured on an interface
which are administratively enabled in the device.
Configured Priority
The priority of the authentication methods. The default priority of a method is
equivalent to its position in the order of the authentication list configured per
interface. If the priority of the methods is changed, all clients authenticated using
a lower priority method are forced to re-authenticate.
Enabled Priority
The methods from the list of authentication method priorities configured on an
interface which are administratively enabled in the device.
Authenticated Clients
Number of clients authenticated on an interface.
Re-Authentication Timer
Interval, in seconds, after which an attempt is made to authenticate an
unauthorized port.
Use the buttons at the bottom of the page to perform the following actions:
•
Click
Refresh
to display the latest information from the switch.
•
Click
Edit
to configure the settings for one or more interfaces, select each entry to modify. The
settings are applied to all selected interfaces.
Authenticated Clients
Use the Authentication Clients page to view information about the clients connected on the interfaces.
If there are no clients connected, the table is empty.
To access this page, click
Security
>
Authentication Manager
>
Authentication Clients
in the
navigation menu.
Table 295: Authentication Clients Fields
Field
Description
Interface
The local interface associated with the rest of the data in the row.
Logical Interface
The logical port number associated with the client that is connected to the port.
Client MAC Address
The MAC address of the client that is connected to the port.
Managing Device Security
ExtremeSwitching 200 Series: Administration Guide
293