Chapter 3 Using the console interface
191
Using the Business Policy Switch 2000 Version 2.0
EAPOL Security Configuration screen
The EAPOL Security Configuration screen (
) allows you to selectively
limit access to the switch based on an authentication mechanism that uses
Extensible Authentication Protocol (EAP) to exchange authentication information
between the switch and an authentication server.
You will also need to set up specific user accounts on your RADIUS server:
•
User names
•
Passwords
•
VLAN IDs
•
Port priority
You can set up these parameters directly on your RADIUS server. For detailed
instructions about configuring your RADIUS server, refer to your RADIUS server
documentation.
Allowed Source
Allows you to specify the ports that each MAC address is allowed to access.
The options for the Allowed Source field include a single unit/port number or a
port list value that you have previously configured in the MAC Address
Security Port Lists screen.
Default
- (Blank field)
Range
A single unit/port or a port list value (for example, 1/3, 1/6,
3/4, S1, S5, etc.).
* Multicast address -- Note that the first octet of any multicast address will always be an odd number.
Note:
Before you use the EAPOL Security Configuration screen, you
must configure your Primary RADIUS Server and RADIUS Shared
Secret.
Note:
Do not enable EAPOL security on the switch port that is
connected to the RADIUS server.
Table 20
MAC Address Security Table Screen Fields (continued)
Field
Description
Содержание business policy switch 2000
Страница 16: ...16 Contents 208700 C ...
Страница 22: ...22 Figures 208700 C ...
Страница 26: ...26 Tables 208700 C ...
Страница 32: ...32 Preface 208700 C ...
Страница 308: ...308 Chapter 4 Policy enabled networks 208700 C ...
Страница 348: ...348 Chapter 5 Sample QoS configuration 208700 C ...
Страница 392: ...392 Appendix D Connectors and pin assignments 208700 C ...