Configuring Device Security
Defining 802.1x
ESW 500 Series Switches Administration Guide
135
5
maximum addresses allowed on the port. Both relearning and aging
MAC addresses are enabled. Previously learned MAC addresses are not
deleted but are converted to a static MAC address.
•
Max Entries — Specifies the number of MAC addresses that can be learned on
the port. The Max Entries field is enabled only if Locked is selected in the
Interface Status field. In addition, the Limited Dynamic Lock mode is selected.
The possible range is 1-128. The default is 1.
•
Action on Violation — Indicates the action to be applied to packets arriving on a
locked port. The possible field values are:
-
Discard
— Discards packets from any unlearned source. This is the
default value.
-
Forward
— Forwards packets from an unknown source without learning
the MAC address.
-
Shutdown
— Discards packets from any unlearned source and shuts
down the port. The port remains shut down until reactivated, or until the
device is reset.
•
Enable Trap — Enables traps when a packet is received on a locked port. The
possible field values are:
-
Checked
— Enables traps.
-
Unchecked
— Disables traps.
•
Trap Frequency — Displays the amount of time (in seconds) between traps.
The default value is 10 seconds.
STEP 3
Modify the relevant fields.
STEP 4
Click Apply. Port security is modified, and the device is updated.
Defining 802.1x
Port based authentication enables authenticating system users on a per-port basis
via a external server. Only authenticated and approved system users can transmit
and receive data. Ports are authenticated via the RADIUS server using the
Extensible Authentication Protocol
(EAP). Port Authentication includes: