369
Figure 406 Displaying port state
If you remove MAC addresses from the secure MAC address list, the port can continue to learn
MAC addresses.
Advanced port security mode configuration example
Network requirements
, the switch authenticates the client with a RADIUS server. If the
authentication succeeds, the client is authorized to access the Internet.
•
The RADIUS server at 192.168.1.2 functions as the primary authentication server and the
secondary accounting server, and the RADIUS server at 192.168.1.3 functions as the
secondary authentication server and the primary accounting server. The shared key for
authentication is
name
, and the shared key for accounting is
money
.
•
All users use the default authentication, authorization, and accounting methods of ISP domain
system
.
•
The switch sends usernames without domain names to the RADIUS server.
Configure port GigabitEthernet 1/0/1
of the switch to perform the following operations:
•
Allow only one 802.1X user to be authenticated.
•
Allow up to three OUI values to be configured, and allow one terminal that uses any of the OUI
values to access the port.
Figure 407 Network diagram
NOTE:
Configurations on the host and RADIUS servers are not shown.
Summary of Contents for FlexNetwork NJ5000
Page 12: ...x Index 440 ...
Page 39: ...27 Figure 16 Configuration complete ...
Page 67: ...55 Figure 47 Displaying the speed settings of ports ...
Page 78: ...66 Figure 59 Loopback test result ...
Page 158: ...146 Figure 156 Creating a static MAC address entry ...
Page 183: ...171 Figure 171 Configuring MSTP globally on Switch D ...
Page 243: ...231 Figure 237 IPv6 active route table ...