![SMC Networks 6152L2 Management Manual Download Page 134](http://html.mh-extra.com/html/smc-networks/6152l2/6152l2_management-manual_1300168134.webp)
C
ONFIGURING
THE
S
WITCH
3-88
Web
– Click Security, Port Security. Set the action to take when an invalid
address is detected on a port, set the maximum number of MAC addresses
allowed on a port, and click Apply.
Figure 3-38. Configuring Port Security
CLI
– This example sets the command mode to Port 5, sets the port
security action to send a trap and disable the port, and then enables port
security for the switch.
Configuring 802.1X Port Authentication
Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
The IEEE 802.1X (dot1x) standard defines a port-based access control
procedure that prevents unauthorized access to a network by requiring
users to first submit credentials for authentication.
Console(config)#interface ethernet 1/5
Console(config-if)#port security action trap-and-shutdown
4-102
Console(config-if)#port security
Console(config-if)#
Summary of Contents for 6152L2
Page 2: ......
Page 18: ...TABLES xiv ...
Page 32: ...INTRODUCTION 1 10 ...
Page 46: ...INITIAL CONFIGURATION 2 14 ...
Page 185: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Page 249: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Page 290: ...CONFIGURING THE SWITCH 3 244 ...
Page 303: ...COMMAND GROUPS 4 13 VC VLAN Database Configuration ...
Page 434: ...COMMAND LINE INTERFACE 4 144 ...
Page 568: ...TROUBLESHOOTING B 4 ...
Page 581: ......