369
Figure 406 Displaying port state
If you remove MAC addresses from the secure MAC address list, the port can continue to learn
MAC addresses.
Advanced port security mode configuration example
Network requirements
, the switch authenticates the client with a RADIUS server. If the
authentication succeeds, the client is authorized to access the Internet.
•
The RADIUS server at 192.168.1.2 functions as the primary authentication server and the
secondary accounting server, and the RADIUS server at 192.168.1.3 functions as the
secondary authentication server and the primary accounting server. The shared key for
authentication is
name
, and the shared key for accounting is
money
.
•
All users use the default authentication, authorization, and accounting methods of ISP domain
system
.
•
The switch sends usernames without domain names to the RADIUS server.
Configure port GigabitEthernet 1/0/1
of the switch to perform the following operations:
•
Allow only one 802.1X user to be authenticated.
•
Allow up to three OUI values to be configured, and allow one terminal that uses any of the OUI
values to access the port.
Figure 407 Network diagram
NOTE:
Configurations on the host and RADIUS servers are not shown.
Содержание FlexNetwork NJ5000
Страница 12: ...x Index 440 ...
Страница 39: ...27 Figure 16 Configuration complete ...
Страница 67: ...55 Figure 47 Displaying the speed settings of ports ...
Страница 78: ...66 Figure 59 Loopback test result ...
Страница 158: ...146 Figure 156 Creating a static MAC address entry ...
Страница 183: ...171 Figure 171 Configuring MSTP globally on Switch D ...
Страница 243: ...231 Figure 237 IPv6 active route table ...
Страница 293: ...281 Figure 298 Ping operation summary ...