Networking
Port Management
Cisco ISA500 Series Integrated Security Appliance Administrator Guide
100
4
•
Forced Authentication:
Disables 802.1X access control and causes the port
to transition to the authorized state without any authentication exchange
required. The port transmits and receives normal traffic without 802.1X-
based authentication of the client.
•
Forced Unauthentication:
Causes the port to remain in the unauthorized
state, ignoring all attempts by the client to authenticate. The security
appliance cannot provide authentication services to the client through the
port.
•
Auto:
Enables 802.1X access control and causes the port to begin in the
unauthorized state, allowing only EAPOL frames to be sent and received
through the port. The authentication process begins when the link state of
the port transitions from down to up, or when an EAPOL-start frame is
received. The security appliance requests the identity of the client and
begins relaying authentication messages between the client and the
authentication server. Each client attempting to access the network is
uniquely identified by the security appliance by using the client's MAC
address.
STEP 6
Click
Save
to apply your settings.
Configuring the Port Mirroring
Port Mirroring allows the traffic on one port to be visible on other ports. This
feature is useful for debugging or traffic monitoring.
NOTE
The dedicated WAN port (GE1 ) can not be set as a destination or monitored port.
STEP 1
Click
Networking
-> Port ->
Port Mirroring
.
The Port Mirroring window opens.
STEP 2
Click
On
to enable port mirroring, or click
Off
to disable it.
STEP 3
If you enable port mirroring, enter the following information:
•
TX Destination:
Choose the port that monitors the tranmitted traffic for other
ports.