Chapter 6
Security
RUGGEDCOM ROX II
CLI User Guide
130
Port Security Concepts
Section 6.6.1
Port Security Concepts
This section describes some of the concepts important to the implementation of port security in RUGGEDCOM ROX
II.
CONTENTS
•
Section 6.6.1.1, “Static MAC Address-Based Authentication”
•
Section 6.6.1.2, “IEEE 802.1x Authentication”
•
Section 6.6.1.3, “IEEE 802.1X Authentication with MAC Address-Based Authentication”
•
Section 6.6.1.4, “Assigning VLANS with Tunnel Attributes”
Section 6.6.1.1
Static MAC Address-Based Authentication
In this method, the device validates the source MAC addresses of received frames against the contents in the
Static MAC Address Table. RUGGEDCOM ROX II also supports a highly flexible Port Security configuration that
provides a convenient means for network administrators to use the feature in various network scenarios.
A Static MAC address can be configured without a port number being explicitly specified. In this case, the
configured MAC address will be automatically authorized on the port where it is detected. This allows devices to
be connected to any secure port on the switch without requiring any reconfiguration.
The device can also be programmed to learn (and, thus, authorize) a pre-configured number of the first source
MAC addresses encountered on a secure port. This enables the capture of the appropriate secure addresses when
first configuring MAC address-based authorization on a port. Those MAC addresses are automatically inserted into
the Static MAC Address Table and remain there until explicitly removed by the user.
Section 6.6.1.2
IEEE 802.1x Authentication
The IEEE 802.1x standard defines a mechanism for port-based network access control and provides a means of
authenticating and authorizing devices attached to LAN ports.
Although IEEE 802.1x is mostly used in wireless networks, this method is also implemented in wired switches.
The IEEE 802.1x standard defines three major components of the authentication method: Supplicant,
Authenticator and Authentication server. RUGGEDCOM ROX II supports the Authenticator component.
Summary of Contents for RUGGEDCOM ROX II
Page 2: ...RUGGEDCOM ROX II CLI User Guide ii ...
Page 4: ...RUGGEDCOM ROX II CLI User Guide iv ...
Page 39: ...RUGGEDCOM ROX II CLI User Guide Table of Contents xxxix 19 5 VLANs 752 ...
Page 40: ...Table of Contents RUGGEDCOM ROX II CLI User Guide xl ...
Page 46: ...Preface RUGGEDCOM ROX II CLI User Guide xlvi Customer Support ...
Page 170: ...Chapter 5 System Administration RUGGEDCOM ROX II CLI User Guide 124 Deleting a Scheduled Job ...
Page 256: ...Chapter 6 Security RUGGEDCOM ROX II CLI User Guide 210 Enabling Disabling a Firewall ...
Page 402: ...Chapter 11 Wireless RUGGEDCOM ROX II CLI User Guide 356 Managing Cellular Modem Profiles ...