
Chapter 8
| General Security Measures
Network Access (MAC Address Authentication)
– 261 –
MAC Filter : Disabled
Last Intrusion MAC : 00-10-22-00-00-01
Last Time Detected Intrusion MAC : 2010/7/29 15:13:03
Console#
Network Access
(MAC Address Authentication)
Network Access authentication controls access to the network by authenticating
the MAC address of each host that attempts to connect to a switch port. Traffic
received from a specific MAC address is forwarded by the switch only if the source
MAC address is successfully authenticated by a central RADIUS server. While
authentication for a MAC address is in progress, all traffic is blocked until
authentication is completed. Once successfully authenticated, the RADIUS server
may optionally assign VLAN and QoS settings for the switch port.
Table 51: Network Access Commands
Command
Function
Mode
Enables MAC address aging
GC
Adds a MAC address to a filter table
GC
mac-authentication reauth-time
Sets the time period after which a connected MAC
address must be re-authenticated
GC
Enables the dynamic quality of service feature
IC
Enables dynamic VLAN assignment from a RADIUS server IC
Specifies the guest VLAN
IC
Enables the link detection feature
IC
network-access link-detection
link-down
Configures the link detection feature to detect and act
upon link-down events
IC
network-access link-detection
link-up
Configures the link detection feature to detect and act
upon link-up events
IC
network-access link-detection
link-up-down
Configures the link detection feature to detect and act
upon both link-up and link-down events
IC
Sets the maximum number of MAC addresses that can be
authenticated on a port via all forms of authentication
IC
network-access mode
mac-authentication
Enables MAC authentication on an interface
IC
network-access port-mac-filter
Enables the specified MAC address filter
IC
mac-authentication
intrusion-action
Determines the port response when a connected host
fails MAC authentication.
IC
mac-authentication
max-mac-count
Sets the maximum number of MAC addresses that can be
authenticated on a port via MAC authentication
IC
Clears authenticated MAC addresses from the address
table
PE
Displays the MAC authentication settings for port
interfaces
PE
Содержание AS5700-54X
Страница 42: ...Contents 42...
Страница 44: ...Figures 44...
Страница 52: ...Tables 52...
Страница 54: ...Section I Getting Started 54...
Страница 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Страница 210: ...Chapter 6 Remote Monitoring Commands 210...
Страница 358: ...Chapter 9 Access Control Lists ACL Information 358...
Страница 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Страница 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Страница 442: ...Chapter 16 Address Table Commands 442...
Страница 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Страница 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Страница 544: ...Chapter 20 Quality of Service Commands 544...
Страница 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Страница 680: ...Chapter 23 LLDP Commands 680...
Страница 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Страница 732: ...Chapter 25 Domain Name Service Commands 732...
Страница 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Страница 1072: ...Section III Appendices 1072...
Страница 1090: ...Glossary 1090 XModem A protocol used to transfer files between devices Data is grouped in 128 byte blocks and error corrected...
Страница 1102: ...List of CLI Commands 1102...
Страница 1115: ......
Страница 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...