C
ONFIGURING
THE
S
WITCH
3-76
Web
– Click Security, Port Security. Set the action to take when an invalid
address is detected on a port, mark the checkbox in the Status column to
enable security for a port, set the maximum number of MAC addresses
allowed on a port, and click Apply.
Figure 3-35 Port Security
CLI
– This example sets the command mode to Port 5, sets the port
security action to send a trap and disable the port, and then enables port
security for the switch.
Configuring 802.1X Port Authentication
Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
The IEEE 802.1X (dot1x) standard defines a port-based access control
procedure that prevents unauthorized access to a network by requiring
users to first submit credentials for authentication. Access to all switch
Console(config)#interface ethernet 1/5
Console(config-if)#port security action trap-and-shutdown
4-102
Console(config-if)#port security max-mac-count 20
4-102
Console(config-if)#port security
Console(config-if)#
Summary of Contents for 8700S-130
Page 2: ......
Page 3: ......
Page 8: ...LIMITED WARRANTY iv ...
Page 56: ...INITIAL CONFIGURATION 2 18 ...
Page 189: ...PORT CONFIGURATION 3 133 Figure 3 61 Port Statistics continued ...
Page 566: ...COMMAND LINE INTERFACE 4 294 ...
Page 571: ...SOFTWARE SPECIFICATIONS A 5 Trap RFC 1215 UDP MIB RFC 2012 ...
Page 572: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 576: ...TROUBLESHOOTING B 4 ...
Page 589: ......
Page 591: ...38 Tesla Irvine CA 92618 Phone 949 679 8000 ...
Page 592: ... 8 ...