
C
HAPTER
4
| Configuring the Switch
Configuring Security
– 90 –
Figure 29: Port Limit Control Configuration
C
ONFIGURING
A
UTHENTICATION
T
HROUGH
N
ETWORK
A
CCESS
S
ERVERS
Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
Use the Network Access Server Configuration page to configure IEEE
802.1X port-based and MAC-based authentication settings. The 802.1X
standard defines a port-based access control procedure that prevents
unauthorized access to a network by requiring users to first submit
credentials for authentication. Access to all switch ports in a network can
be centrally controlled from a server, which means that authorized users
can use the same credentials for authentication from any point within the
network.
Содержание GEL-2670
Страница 1: ...GEL 2670 24 GE 2 GE SFP L2 Managed Switch User Manual Ver 1 0...
Страница 2: ......
Страница 4: ......
Страница 6: ...ABOUT THIS GUIDE 6...
Страница 18: ...FIGURES 18...
Страница 20: ...TABLES 20...
Страница 22: ...SECTION I Getting Started 22...
Страница 34: ...SECTION II Web Configuration 34...
Страница 46: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 46...
Страница 224: ...CHAPTER 4 Configuring the Switch Configuring sFlow 224 Figure 95 sFlow Configuration...
Страница 293: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 293 Figure 156 Configuration Upload...
Страница 294: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 294...
Страница 296: ...SECTION III Appendices 296...
Страница 314: ...GLOSSARY 314...
Страница 319: ......
Страница 320: ...Level 1 GEL 2670 E012013 KS R01...