Chapter 8
| General Security Measures
Network Access (MAC Address Authentication)
– 231 –
Command Usage
◆
When enabled on a port, the authentication process sends a Password
Authentication Protocol (PAP) request to a configured RADIUS server. The user
name and password are both equal to the MAC address being authenticated.
◆
On the RADIUS server, PAP user name and passwords must be configured in the
MAC address format XX-XX-XX-XX-XX-XX (all in upper case).
◆
Authenticated MAC addresses are stored as dynamic entries in the switch
secure MAC address table and are removed when the aging time expires. The
maximum number of secure MAC addresses supported for the switch system is
1024.
◆
Configured static MAC addresses are added to the secure address table when
seen on a switch port. Static addresses are treated as authenticated without
sending a request to a RADIUS server.
◆
MAC authentication, 802.1X, and port security cannot be configured together
on the same port. Only one security mechanism can be applied.
◆
MAC authentication cannot be configured on trunk ports.
◆
When port status changes to down, all MAC addresses are cleared from the
secure MAC address table. Static VLAN assignments are not restored.
◆
The RADIUS server may optionally return a VLAN identifier list. VLAN identifier
list is carried in the “Tunnel-Private-Group-ID” attribute. The VLAN list can
contain multiple VLAN identifiers in the format “1u,2t,” where “u” indicates
untagged VLAN and “t” tagged VLAN. The “Tunnel-Type” attribute should be
set to “VLAN,” and the “Tunnel-Medium-Type” attribute set to “802.”
Example
Console(config-if)#network-access mode mac-authentication
Console(config-if)#
network-access
port-mac-filter
Use this command to enable the specified MAC address filter. Use the
no
form of
this command to disable the specified MAC address filter.
Syntax
network-access port-mac-filter
filter-id
no network-access port-mac-filter
filter-id
- Specifies a MAC address filter table. (Range: 1-64)
Default Setting
None
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...