Security
802.1X
Cisco Small Business SG200 Series 8-port Smart Switches Administration Guide
145
11
STEP 4
Click
Apply
and then click
Close
. Your changes are saved to the Running
Configuration.
Viewing and Configuring Secure MAC Addresses
To view the current list of secure MAC addresses and the associated ports and
VLANs, click
Secure Address Table
on the
Port Security
page.
For each interface, the Secure Address Table lists each secured statically
configured MAC address, regardless of the locked/unlocked status of the port.
The table also lists dynamically learned MAC addresses for locked ports. Dynamic
entries for a port are cleared when the port is changed from locked to unlocked or
when the link goes down.
You can click
Static Address Table
to display the page for configuring static
addresses. See
Configuring Static MAC Addresses
. Be sure to set the Status
field for the entry to Secure.
You can click
Port Security Table
to redisplay the Port Security page.
802.1X
Local Area Networks (LANs) are often deployed in environments that permit
unauthorized devices to be physically attached to the LAN infrastructure, or permit
unauthorized users to attempt to access the LAN through equipment already
attached. In such environments, it might be desirable to restrict access to the
services offered by the LAN to those users and devices that are permitted to use
those services.
Port-based access control provides a method for networks to control whether
hosts can access services provided by a connected port. You can configure the
switch to use port-based network access control based on the IEEE 802.1x
protocol.
The 802.1x protocol defines three types of entities:
•
Supplicant: An entity that requests access to a port at the remote end of the
link. The supplicant provides credentials to the network that the another
node on the network—the authenticator—uses to request authentication
from a server.