
C
HAPTER
4
| Configuring the Switch
Configuring Security
– 90 –
Figure 29: Port Limit Control Configuration
C
ONFIGURING
A
UTHENTICATION
T
HROUGH
N
ETWORK
A
CCESS
S
ERVERS
Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
Use the Network Access Server Configuration page to configure IEEE
802.1X port-based and MAC-based authentication settings. The 802.1X
standard defines a port-based access control procedure that prevents
unauthorized access to a network by requiring users to first submit
credentials for authentication. Access to all switch ports in a network can
be centrally controlled from a server, which means that authorized users
can use the same credentials for authentication from any point within the
network.
Summary of Contents for GEL-2670
Page 1: ...GEL 2670 24 GE 2 GE SFP L2 Managed Switch User Manual Ver 1 0...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 18: ...FIGURES 18...
Page 20: ...TABLES 20...
Page 22: ...SECTION I Getting Started 22...
Page 34: ...SECTION II Web Configuration 34...
Page 46: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 46...
Page 224: ...CHAPTER 4 Configuring the Switch Configuring sFlow 224 Figure 95 sFlow Configuration...
Page 294: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 294...
Page 296: ...SECTION III Appendices 296...
Page 314: ...GLOSSARY 314...
Page 319: ......
Page 320: ...Level 1 GEL 2670 E012013 KS R01...