AAA Authorization and Accounting
3-83
3
Web
– Click Security, Port Security. Set the action to take when an invalid address is
detected on a port, mark the checkbox in the Status column to enable security for a
port, set the maximum number of MAC addresses allowed on a port, and click Apply.
Figure 3-51 Configuring Port Security
CLI
– This example selects the target port, sets the port security action to send a
trap and disable the port and sets the maximum MAC addresses allowed on the
port, and then enables port security for the port.
Configuring 802.1X Port Authentication
Network switches can provide open and easy access to network resources by
simply attaching a client PC. Although this automatic configuration and access is a
desirable feature, it also allows unauthorized personnel to easily intrude and
possibly gain access to sensitive network data.
The IEEE 802.1X (dot1X) standard defines a port-based access control procedure
that prevents unauthorized access to a network by requiring users to first submit
credentials for authentication. Access to all switch ports in a network can be
centrally controlled from a server, which means that authorized users can use the
same credentials for authentication from any point within the network.
Console(config)#interface ethernet 1/5
Console(config-if)#port security action trap-and-shutdown
4-110
Console(config-if)#port security max-mac-count 20
4-110
Console(config-if)#port security
4-110
Console(config-if)#
Summary of Contents for 6128PL2
Page 2: ......
Page 8: ...viii ...
Page 26: ...Contents xviii ...
Page 30: ...Tables xxii ...
Page 52: ...Initial Configuration 2 10 2 ...
Page 308: ...Configuring the Switch 3 256 3 ...
Page 473: ...SNMP Commands 4 165 4 ...
Page 644: ...Command Line Interface 4 336 4 ...
Page 648: ...Software Specifications A 4 A ...
Page 663: ......