
79
■
Disable and re-enable Limit Control on the port or the switch,
■
Click the Reopen button.
■ Trap & Shutdown:
If Limit + 1 MAC addresses is seen on the port, both the “Trap” and
the “Shutdown” actions described above will be taken.
◆
State
–
This column shows the current state of the port as seen from
the Limit Control's point of view. The state takes one of four values:
■ Disabled:
Limit Control is either globally disabled or disabled on the port.
■ Ready:
The limit is not yet reached. This can be shown for all Actions.
■ Limit Reached:
Indicates that the limit is reached on this port. This state can only be
shown if Action is set to None or Trap.
■ Shutdown:
Indicates that the port is shut down by the Limit Control module. This state
can only be shown if Action is set to Shutdown or Trap & Shutdown.
◆
Re-open
–
If a port is shut down by this module, you may reopen it by clicking this button,
which will only be enabled if this is the case. For other methods, refer to Shutdown in the
Action section. Note, that clicking the Reopen button causes the page to be refreshed, so
non-committed changes will be lost.
WEB INTERFACE
To configure port limit controls:
1. Click Configuration, Security, Network, Limit Control.
2. Set the system configuration parameters to globally enable or disable limit controls, and
configure address aging as required.
3. Set limit controls for any port, including status, maximum number of addresses allowed,
and the response to a violation.
4. Click Save.
Network Access Servers (NAS)
Network switches can provide open and easy access to network resources by simply
attaching a client PC. Although this automatic configuration and access is a desirable feature,
it also allows unauthorized personnel to easily intrude and possibly gain access to sensitive
network data.
Use the Network Access Server Configuration page to configure IEEE 802.1X port-based
and MAC-based authentication settings. The 802.1X standard defines a port-based access
control procedure that prevents unauthorized access to a network by requiring users to first
submit credentials for authentication. Access to all switch ports in a network can be centrally
controlled from a server, which means that authorized users can use the same credentials for
Содержание GEP-1070
Страница 80: ...80 authentication from any point within the network...
Страница 168: ...168...