beautypg.com

Configuring 802.1x port authentication, Figure 199: configuring port security, Port authentication – LevelOne GTL-2691 User Manual

Page 382: 1x p

background image

C

HAPTER

13

| Security Measures

Configuring 802.1X Port Authentication

– 382 –

The maximum address count is effective when port security is enabled

or disabled, but can only be set when Security Status is disabled.

Current MAC Count – The number of MAC addresses currently

associated with this interface.

MAC Filter – Shows if MAC address filtering has been set under

Security > Network Access (Configure MAC Filter) as described on

page 336

.

Filter ID – The identifier for a MAC address filter.

Last Intrusion MAC – The last unauthorized MAC address detected.

Last Time Detected Intrusion MAC – The last time an unauthorized

MAC address was detected.

W

EB

I

NTERFACE

To configure port security:

1.

Click Security, Port Security.

2.

Mark the check box in the Security Status column to enable security,
set the action to take when an invalid address is detected on a port,

and set the maximum number of MAC addresses allowed on the port.

3.

Click Apply

Figure 199: Configuring Port Security

C

ONFIGURING

802.1X P

ORT

A

UTHENTICATION

Network switches can provide open and easy access to network resources

by simply attaching a client PC. Although this automatic configuration and

access is a desirable feature, it also allows unauthorized personnel to easily

intrude and possibly gain access to sensitive network data.

The IEEE 802.1X (dot1X) standard defines a port-based access control

procedure that prevents unauthorized access to a network by requiring

users to first submit credentials for authentication. Access to all switch