
Antaira Technologies - Industrial Ethernet Switches
LNX-2012G-SFP Series User Manual V1.0
60
Action
Specify the action to take with a frame that hits this ACE.
Permit: The frame that hits this ACE is granted permission for the ACE
operation.
Deny: The frame that hits this ACE is dropped.
Rate Limiter
Specify the rate limiter in number of base units. The allowed range is 1
to 15. Disabled indicates that the rate limiter operation is disabled.
Port Copy
Frames that hit the ACE are copied to the port number specified here.
The allowed range is the same as the switch port number range.
Disabled indicates that the port copy operation is disabled.
Logging
Specify the logging operation of the ACE. The allowed values are:
Enabled: Frames matching the ACE are stored in the System Log.
Disabled: Frames matching the ACE are not logged.
Please note that the System Log memory size and logging rate is
limited.
Shutdown
Specify the port shut down operation of the ACE. The allowed values
are:
Enabled: If a frame matches the ACE, the ingress port will be disabled.
Disabled: Port shut down is disabled for the ACE.
Counter
The counter indicates the number of times the ACE was hit by a frame.
5.10.2 802.1x
This page allows you to configure the IEEE 802.1X and MAC-based authentication system and
port settings.
The IEEE 802.1X standard defines a port-based access control procedure that prevents
unauthorized access to a network by requiring users to first submit credentials for
authentication. One or more central servers, the backend servers, determine whether the user
is allowed access to the network. These backend (RADIUS) servers are configured on the
Authentication configuration page.
MAC-based authentication allows for authentication of more than one user on the same port,
and doesn't require the user to have special 802.1X software installed on his system. The
switch uses the user's MAC address to authenticate against the backend server. Intruders can
create counterfeit MAC addresses, which makes MAC-based authentication less secure than
802.1 X authentications.